, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x100800000000002, 0x80) sendmsg$inet6(r3, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000400)={0x0, 0x200, 0xa696, &(0x7f00000003c0)=0xc548}) write(r6, &(0x7f0000000040)="e0", 0xfffffe00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r8, 0x80045300, &(0x7f0000000080)) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x10000, 0x0) ioctl$VIDIOC_G_FMT(r8, 0xc0d05604, &(0x7f0000000580)={0x1, @raw_data="307c1ce54c958e45e41ce274071802fbfb59ed759fdab5951153ff191ea75958fb02a30cb158dcc4c9b7f4606812dc55f228de7f63a62319a0ea75d04b9b48bf1b9199a390e029a20c07613b81751614bdeb9a6195617930b6dd42aec87227708997df207afdba21a166b573c6e48fd893b803b478e5184e3c05f68f764664c5a1e3752c18168ad15cdcd47ad0a785368d14b49cda270e5d76bfe991c38df5ff4412a551bdea6494a4a3e7f6408501364bf95a5c2c1f15b23487c0dc9f10065ab61b97bb3b4b12a9"}) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r9, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xb8e52ef4bf11f2d7}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r10, 0x2, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0xc0) ioctl$TIOCSETD(r6, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="021800000a0000000000000000000000030006000000000002000000e000000200000000000005000500000000000a00000000000000ff02000000000000000000000000000100"/80], 0x50}}, 0x0) 08:21:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0xe) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000200)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000240)={r3}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:08 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:08 executing program 3: msgrcv(0x0, &(0x7f0000000180)={0x0, ""/80}, 0x58, 0x2, 0x2000) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="021800000a0000000000000000000000030006000701000f02000000e00000020000000000000000050005e000000000000a00000000000000ff02000000000000000000000000000100000000000000"], 0xfffffd08}}, 0x0) 08:21:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x9c2813f8b9394922, r0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000440)={0x10001, 0x10, [0x1, 0x7617, 0x2, 0x0]}) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x200}, &(0x7f0000000400)=0x8) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0xffff, 0x0, 0x8000, 0x10000, 0x5c3e, 0x0, 0x8, 0x8, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000340)={r3, 0x1}, &(0x7f0000000380)=0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ff0000/0xd000)=nil) 08:21:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(r6, &(0x7f0000000080)="be47e732a7f002873ee0", 0xa) r7 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x10000) ioctl$DRM_IOCTL_SET_MASTER(r7, 0x641e) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:09 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0xc0440) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000080)=0x7ff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x18, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x4, 0x0, 0x6e6bb4, 0x1, {0x6, 0x2b, 0xef, 0x1, 0x0, 0x200, 0x0, @in6=@mcast1, @in=@rand_addr=0x5}}, @sadb_spirange={0x2, 0x10, 0x4d5, 0x4d3}, @sadb_lifetime={0x4, 0x3, 0x401, 0x9, 0x7, 0x6}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @local}}, @sadb_x_filter={0x5, 0x1a, @in6=@dev={0xfe, 0x80, [], 0x15}, @in6=@empty, 0x10, 0x8, 0x4}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d6}, @sadb_x_policy={0x8, 0x12, 0x2, 0x0, 0x0, 0xffffff84, 0x9, {0x6, 0x6c, 0x9, 0x1, 0x0, 0x80000001, 0x0, @in=@multicast2, @in=@broadcast}}]}, 0x120}}, 0x0) 08:21:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) clone(0x20c4000, &(0x7f0000005e40)="07cffac884e8d59eab34da150aae", &(0x7f0000006100), &(0x7f0000006140), &(0x7f0000006180)="3fecc4fcac25c92ad6edc398170b2cfcd66581b7ff715eacaa817c61c24624f60f5074049075b0cd1c6495d845e613b1178bd283afdeb9aec49dcb450cebe60bf8014896caa0141995f5a180a2e4992d8da012d07d88e119f6bd35eeb101cbbcbd4312ae8d472456ca1fa935b2f75a2203b659ad29fb5cbc4670ba7b485fbef207eb51c00a49400ec4e8eaaf307ed9bdedb520e83344c7044f1812ec88da3e850080ddfe68b885f8461908630326bb842f3641ecba109f62cfe12bd85aadf1b10d38e7ce73ba7f12fdcad3819020a18654e42981fb9c954a8ab0da9f4e3b5d94d9c492a1d3a3fd29ff10deaa5034c466e36e6113dadfb67878f1231f30945e4e668f095ca5bc394e8fc38bba33c2239ef669d189611c6cad89ca0429ee40104ee3656e9576c043252de27a424ecb7c0e369a4f6be9d5308b28b6389a82d1d561250c18ae04468a1e57871a195d139d9b19b08e145c5c78d6c7819ee1c33dfa8fac6aff5a77d41f0de8c9ade8a65f70e5fb4ce710197ccea620cc0456570b95894e34b5474028be3ad79ac6752ace91793d2b841979b649a7a675e998f27d58b2703885c8067abd61944ac4abe93b1a4bb818c9f1d97d9ba348533f9810d85c3d8a1d1c819ea3bfc22b36c59f569ac4071390f9886757171fbc5a310cc2d8136138bd3f8b85dc594cd9a927993c49ddef5c597ae03a0b1aef72a472403884552c45690866b26b38ce29d4af3e3d4af8049819567d5cbcf4a68a0a5934d612fc94ad79cb91837f90e84beaf96e146b73fff170cc2fd1a21165213230ce97956bdb5ecf5897311262c5bc6c9547a251cb9de50ee2b65a38219f28064e423570f1dc87ddac3a3925874ec48b1ab5ecf039d0f42d22ffcbd681ca8f652a702eca557f366f517885ca49eb0bb6a44a3c6abcad1521b76525fad683d8a2dfd36111d9897a86c24eba8dd0df9c48f68b7c8baae65283090251e793b41eca3975acb5f7d88fcac65739fed365c3f289f28f6afb5ff3e3cb467cfb600533e6b10dfe158ccbf3645003d1a765dc07a609628b9b96011658a572cf4ce0a864ec95af737acfde703a58e298bf0460087a087666f40884628756c27752ce08b054ac0aeb2ffb063d7fe7c937dccef1715e8ce95577985179d7fac62e18c91b98258947aa72ff4dc38311a0d2cecb107600dd81025cfc4e49c0e33276e88bdbb6e08bc5dc00a0322def6b87729487b063b4c08104580ee84659660e56a6d31019c8b408f5fd3e1d3662c398bf0ffcaead0aa7793caad88c1a86db3a4db55571a14350261b11cbe1b92dcfbbacaf182e0af2bc3de6ffacf339099a1eab326497603a2abac8771a575152dd80d770f57c7eccb3e0d51d9bf22576dae0d308a4f431c849e0fd24f34a94a92b0b6e3b35379ffa5cdcdb908fc9f7777ecab91a4e0c52f13ffce0e44e06399b20abed8dae75f329977fea8ec687f6392b326034634db44812184fc33192a27f09f4663714fa3e75f303a4af360f9736074f214ffb8b4ca36b4fc269d8d00eb8627fa38764a3c4bfbec59087615ca73d644babecbe3db4e9411505588841b85226969eafb6b4af651ec90fd505384b836dc743673a12bbbce8979401edbc6111ebe98de78e1ffb1236c97369fd2f8d0292953ad0751de1ddd93f0fa785375c721d0d4db07a11de368af278e7afb1f09be32af4cd4f41355834f1add8db34d0e643d343338128237aef17aa02480e857351a957583b84e1a93ce1ab2b9dd16276ee60ab1df3afaad612864ab9d1086b4b0e510645be0eda7fcdbeedb5190a4fb9c638588af9eb54487cbc878acaa18a439e71928041cd402d9e4434e2665652bc9164303499263f3d3ba2824a2324766dc586f0c73c48e1ef83f219317b2974e83ad9f6862b03315605f6eb596aef29b32b31cc8430c9905a6f32406065d296ff20fc0bb04dc7b8bc60a8090ddcebc90f159de86db767095c6f0af80bdb42b7334da4a41259ac7047a63e0e2d5266935bd81901570327448459e13b73b6c1b39fa2646406e1ec1ebe5fdc9b0bf6cff73fa593f5d88b30f26afc67f31819dca05b2256be7c7db2f5f6da394abcc0218e37f59a7a17449af1d882e514e9207e71480b11b95307e88f8922788b83b7b7573eb03c16008f94f3fafd2d98169b8b353b07ba011e74c80096bcb4bd9aa85313ead7726bbd225a267f024433a2e21bf468c475e287fdc099f30e7461cfd58bcc2d9d646dd528cbef891d39c67695b7cea27934c125ffdc423ecb5f82a8fa72a1f2b3f3f345937ef47052e5da3960a48b4a5e18bf7afa24f227d95ac107e75b0cc23180316efd020fcbd5af6b3ba07f6ad2037cd4fd67f5dcfd5f14ba2e1a7278bf826ef3a09ea64fdb9669a7e6fe611ef6db7ba166fbc7e7034aea689dcf5efe17ea4e51224496d55fd46534244daf221dd64443ab8d3a9610330b3cf85064600d2366bef88e386fde8d6e3a377922337921828109363fac28a2f64e1218ad8104de45e22e70e9c668c8312011bb132a744bfeec91126dcb7eed751547c78b261965fc875160a92035886a8c99ce793956be1ba5ece545d41696ad467bb1678e46121bce1e0cde69d6d4b99ffea03702bb8d48826084d2a1010f68f3987f0002dcf37f797f33d95c0ffcb9159cb24a2b682b0b7eed31e8c6702dda70a5dbeae729bcf19901483a52916c0d3d285d3a189d2661b4ca953d404b6d57fa8e6016ec3058f444114549e560f0794536588e5bb39878f51fa3cffc54d281c211d527144a28a800d12f8b2157368b4ace70665d1f14f5ff9fe9fc533507de72110f16be38bbbeb1fa129696061b2b17173b0897adb2c77917a4ff80151c9b9b8d9d0d7e0b9323da84307bc40609de6905d3cc4c2368424cc41a8fa82545633d17e1b253cf0840d778c205d7c7e5e08e2e2368e7497023780503559ffa6ed2274dbb5db12ef03832e987d61e57fbaa9666fa22b09a57cb6ed5069b678b4e603c56b6f875b3f8a44911f578cd9e2fa77e8e24b53c0a97f59ded47347019c3ba53beefc53403da97c9a0475767c9b5607c52c0cf53ab9f9e7896c1e12e6005cedd12b42a68b5029336dd9584c75e8434ce8f462eb86564191943ee8787b1bf72213fa8fa810ea68cbe889e98404f3aacbb22b660717362e722faf621b3fbb1f89332297c288ea04564fda1f9c728e5731913907ae9c2b490bc18f0ef94f61ad55a318ab4c71a1ca66717bdf4da177ec38199efbc045987348ad54c177e0ff0717b3963d1e43772ba64905af0ef7c8b79888ac603d029134beb64b258160bd321d9df9383750ab02e1c073d72342c68a909a16feed6d3b17241692834fec04d4abcaf147b278edf3afadfbfcc0430bd6f72f86ae06dc0b1e5355b7fc1f6ba1444ee461a4bcea1061f46fe966769f98450532237291bf31f7f84aee51c6dfd76fcdc2db94f1565c66dbc85752ab70319a4cd7e49b6e6f5fe84f4bbaf3786d6c677cd4d90490bace4de994d1d4b97836ad40ed38ad462ad1a2579ef7065096d2aaa51960d9d892d64fbe86b3548b21f09ee20f16d42194ef05410fa3ae1443480df027a297caa41b6f8a20162d54f846f5f0bb3c0e667609211c50be7ba48ac9941d557c003062c018706b9616e6fb59b3b3fec9fc1f1f82c71594e8cad26f65bfd8a97a1853b8ce7c446fefb495e3137ea3914e72a3128d22a45c107be8850c80437a7afedfa6af78cf772e4ec3a079eb7508f7b619f8fd02cfe156e67f24994fb8653aabdaf7500885df7605788dc9ba27212ae02953ec57f244a533662d8cbac9d0f80e9570c2b52690b85037369a70d63d65069e96d313543c321ddb6066456fb8376bf69df994795ea347dd5b57d4506f102cc53a3a282cbe0828e655b3dbe92fe98bfd83c45e3c5c147d72ebfcea6fd1266604929ccdc92aa4c63a8b8eee601d51cd5f71be22732a67e013fc9684e6f48a8e2e20f5bd03c9189e9860ef7909fb4ad42f40eec519a64a3280a825954638bb7327669132482fcdb146921ad2e6d6968c750913e916efb4754d60b6a74111a118a48f01da4dd36ee90407807911cc4c8af444dce394203b5e2d50714499d2664b347829e8162438a63fc2b791af1b4615f99114a34bc58055ee47dc31c854d567be6c3c1eced104f76625cfd74810596240c466de28762bd8863cb81d54d0dfe56bc097e6dbb923f84c4c1b464bc785177f7c9a72c15028f250d7476d64e6563e3801bc5cfa314ab2a38eaf96c8b213cd16e5ac2e8806248eb87e9ab91e1ca27b4b2f7bcc992abddb5d5a5bbaad4b6617bc61096896207d40467c15cbb654a8b02caf6a0d7e3e2dd05d80641359cff92b48fc7edf41e59dc206cf1e30664298910f00e3366410bc9ad95342daaeb70294160db64fc8fb8458e347310ce20dbab821641e64e8ba9dd8c8856eb6cef3a97bcccfee9bfa53f0c3d14afd81245ddaa2f0fd75f94452abdfe8f6e48eaa15e2a6adf490aa53ac3b2f9199766b90690765358c583a48248062c543f7b4db326d39207ce8808ebe95aaea8994637896930c74cdf70b2a38e2045d92bcfb97cfdfbf8c0b49675dfa07f798c627805f438daf007c8f5a6418369826fa16ffc29f922135981a322c6046b3406d38c6c7e3923d11034dae733d499abc4539649a161b47fc0de4926d517af511e7cb21f8024204ae9f845d94c83e48b0acb18573edb0af5e2643d35c1175fb3ba564b48269fcce557314ab9d5a0e7417caab07604fde9614d35f1f82788e3f86c64da2abd51d0726a2cb8f6a6dc1bee46225a11a33cb0a39ef96918f40aab1d56f1a55bb5981d7acc28ce25502f29934c0c4077c7f3209f3dfc29f9f8e952c781e8c3ab765891a1d3f36e8ca216d81c1ac6c5d4236e58c6e49757f1a0ca9ddc37bfb48c68c5b11b822472653ed9799a27af2b62fb511875151a18b3b55970f64ced756ddfe1b0437a5f35f8b969037ba5067c6ab95697730252fcb1fe47e14dff32bdf54a807408d61b6d9133167bce9004480e72155d30177d16614af05cfc764528e4579fb871893f4b05b8149c7312d3e16f97d19c181390245adcdca9f10080a166bda2bf8a10a734e14a6c42979db4c2d76963703a401a19ca1b1e8c6f2b273c92402bb29c5909ff84a3053db89d280eafe11ecd978201b61afe7be183b0a3ddbf5b2e3f7b993ed14cfad20f83249727415b474cac41b91dec7e2d5095853012a5a1500310ad71626a05c196e8fbae93ae1c9f9af17c38effe44e7a50c8f2a94e6afcef16f07cbe6e29b7d572533232ba3c700827e1a6be417a54b178e4affc27140a681284d74af5ddd7357006495d816cc0a4c8f8c840570bc6b621d120bbf83fa2faaf03985f67ffa0573368c7a80701b1e127cd65e23597a8ec52368d63bd177a3dcaa0f8830baf06b36352746ffa5e1529779251fb42ba5378e28d58bd8d6a772c2a4e0093766de465e18926f7dcb60dfb5180bb4cafae5b6a0486b292041108d35816e1a024c9fb4c950c2c171ddf3f4ab727aa22fd49b52565c3550478ed40269b68fc8db029de206ec4ec8fb1c9b652421dfd77492645985c9d96fe04ee0272da4dd8c73f28d666fcc4035a616a28ab251469f6989f2e8b9024cd6d950ffed12041d342f95db60d6ec2fe93b38225f728f6871e3dbec469bad17d97fe13be47a4ea6e8913547cede649a8b7789646045bf24766da7462f3ad8e827404e6f5dab2082fb11a78695877de3d8e0e2f253f68f889077964a97e2abf64107e936cd3994") r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='\x10\xc8\x92\x82\xd6u\x98\xc9\x03\x00', 0x8000000000200002, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000002400)={0x5, &(0x7f0000001c80)=[0x5, 0x10001, 0x1, 0xfffff800, 0x0]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmmsg$nfc_llcp(r7, &(0x7f0000005f40)=[{&(0x7f0000000200)={0x27, 0x1, 0x0, 0x2, 0x5, 0x6, "0393c0bd12ecfdd2f415a77b31bda6e3297385d9362cbe26cf7b69d4317cad2ca30838a0e73c6eeb57927a2b2bab14d6fd3f50409ecefc734d929f5a506dc7", 0x22}, 0x60, &(0x7f0000001880)=[{&(0x7f0000000340)="839934cbe73a5ace07556dc6dc2060f4d49d54a1477425d330534ffc908f2b9a68e07ef2ace5961004b749e296d162091ff1e520f73b274545bb963c0e41b538d32c3e670a2782e542278c9e6fa4b86de16bced6551792bf0a3430d61d2a66ff7fb417d7c2c1c0629abce0ddd3c16386547e8ed06edeae7b481e1b5f286e378ac1f20eafed2e2ebdc11ba2d1a8fb6d06fdaad86e4aec4fd793f4502cb1a2f3d77b7edd0b42ca8112c1dfbe3c0ab6512c15473b3594", 0xb5}, {&(0x7f0000000400)="99cf93ca91c390e6641eae4ea3fac11994a98f828e8fa88e2c6637d357aeb9590c6d4f610b4ed0bc", 0x28}, {&(0x7f00000004c0)="d3855fb4cb7a23b5390ad97eb11e3b6224db238f0590d288cfc94687e48b74ac27211f4353262a67fd298bc6d2337820b6ad5e3da481b13f911dd765bf80788d7c0cc07a632a5f835aa149f2faf1eece3b550543e69b8df227c6e36d02ef553bd9ce19c5bff408b6b1beb498ae47c10168805ec2a9a4966e386d6e782781cf46bdb6cee7efdd7e571a08c69dd9099101a047d4cf4a8e1fdb80e033ae97c16a76e81767ef814a698fce7deb", 0xab}, {&(0x7f0000000440)="e8d47f6e8daee04c604a1b5edba3e574410ec58a833a8c93df46baefda649c20ba1f73f2b1f3de9bdcb04b1db7b58f25b36ff618a9285ada3682c7", 0x3b}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="ec6770568eff7cb7c0ef57fcf6d3df93c87518f1a1b0f773b3a9514c25590751a54b6e83953b67b813ee272e4756c3a9b6bc6c99981cab338252aab1ffcb896db40589720e077c29865ddffe5cde14518a41f64f7ed70811ed79ea6ef51155539f69baa65d37d8f45d28acf46f3bdf628cd8fcc021e3abf3ef2141468df64b70f199a5495d49", 0x86}, {&(0x7f0000001640)="3ec56070254838a40219160d9922e3ef4e5b32851cddd1c606db8ce527e2b304c7a7066b7796f79e4afb2f886bacb992218f4605baf486157e87a2661f3aa5b8e1d07c81c1983bf442f7aa11785debec17afd47a1dda93a36e29d0aaf1a689d30afa3cdbdd5c0b5c791e810be8407245560efa1275fadeb5bd0a074427e79191e207d8b48f64fa544ef120178fd6de729b3f3530315999c0de6e0180d710e43d902ca6312b72980f8b8c9311ae276cefc202ddeb4249b85849f813ba2747fb79f1bd", 0xc2}, {&(0x7f0000001740)="ecac6ea3801c9280000518e840f45e257df924ed980f9f3fa1131b273c4cd5309ecf8ce70e5137e3", 0x28}, {&(0x7f0000001780)="499b5b180ddef99f2000465d7f10aa19d527960d9111efdaed7c63b8c050b8737aa6665536e12967ff74251d65d7d024753ed4302c7cbfc4208fdbb56dee9c62f3b3afce13c608b37357553193908f8bbbf12eb4a9aa80d9f23b92218b090fc1b0072bab2116b3503d7419", 0x6b}, {&(0x7f0000001800)="4c538c7081bce06e5f028491eb43dbfbda90a68a2cc3f334856cfe2a35f1813d267d5adead3264e9ea1481e0f7d1eb75a04483ec528d177eb3798003e15953bf22d7ea9a0095c4763581dc465dcbd934b008b2eaedb0fac613e657f417a99cd68a9f869eb6", 0x65}], 0xa, &(0x7f0000001940)={0x60, 0x1, 0x7, "f45f5d69a44fafd913dffa0f1c0f38c1f56fe536c73db9466e3ddf39bf96b254bd6c7462a5dc82431bfa6ba48c9f9b2e279378e2b2dbb694b60cb9996308b392fdc487266297fec6f5635f"}, 0x60, 0x34040000}, {&(0x7f00000019c0)={0x27, 0x0, 0x0, 0x7, 0x9, 0x9, "b0347838dc8780b0cc027e24001a9b197e3c99dbebc6cb4d86117751f459bbb6695381b20c21549baebff69e99b13565de117613258f00a138acf5a35aead3", 0x28}, 0x60, &(0x7f0000001d00)=[{&(0x7f0000001a40)="27ebfe699b2347170b902d8115006e13255372f6702b1559b73eac3a86bf151e6f5819a4abacf04f726207bb02eec6cb0d05238c05d8ffffea0f1be0ae81b02b29934f042b67ff658f6f902efb3811f80849042805ff129ef2edaa5c34a4156721d77a24dc3e6011", 0x68}, {&(0x7f0000001ac0)="e5ea13a68e177592cfa78d7c53b30c8bf02a706324fb930fdeae1f73c0ab042c83bb68c04f4f436d697580f10b6b3a01c05647d728c163ac59026dee329e3a91ec865bb96483550c0438d0fed02ec7cd955f690030c8a81573e1f791f74987a055d8630f0f36eff48895e2f4592ca33a46f3ec66ad321dc1ba2a8e71e68adc46c9d983f0221a587656f5bac7e301c1f1f354e77b086a629e4627bc5f47312dc58b393b558d12a7c4f1a52d44d3201b51dd8941ab8f29d8a4af6a8a1553be039138aa087bf68dce5b9e3596efcc4b4cf3ad452fb2b9ff937121b73aca803c108c75bf5bb3151514a7d0e52338ebda2fb4", 0xf0}, {&(0x7f0000001bc0)="c52977bcc2852ce659655d14c495f73539dade5759566a3a0a39458083a2cfd8c4a0542b5ce9c3bf3719293eab128fe09f18bd42b46e99ecc752bff6f88ce1240d0ffe28574c63849c01442c2f71", 0x4e}, {&(0x7f0000001c40)="14e107d2e9393c2c84e5f3f7fe61e9", 0xf}, {&(0x7f0000001c80)}, {&(0x7f0000001cc0)="6fdd5c9e6c5cee", 0x7}], 0x6, 0x0, 0x0, 0x40000}, {&(0x7f0000001d80)={0x27, 0x1, 0x1, 0x7, 0x40, 0x8, "359e881e091c8b975d4f2756ad0d6876a33781f51de1cd55454d85ffdb77d22a7ebd434e7a9ff53bceb1de928db76055a8aec0422d3e093099ec68d8ef0192", 0x38}, 0x60, &(0x7f0000002140)=[{&(0x7f0000001e00)="9f40f8a0a714a8c23439afaca9155b4bee2b", 0x12}, {&(0x7f0000001e40)="0da3d263d8506adb68bb0c589a16a3c4db00137d43f42c3a447b08b1c9138961ea7deab233b0413f10a40a4e4b550c53a933f7fb04035b8a7c9b4d3b869195a3d1a578b861c2c3be2228451f5a93400cc9ab0d47e0d6995257c25024f4c5f21d165902515d4c75238feeee886315bbf431ec5c2caf28994dfcffd5d8e2110777190a79961994eb3010aaf84d19d17166176ef53c0c41a13b069fd75f3fcd9d4e14ea7b665ad9da2bb76345c40fd5951df234e1f88b8bf74f29d1ee3cadb26672eccbaf3bb9c51cb2fc1c12e3e569dba79ad293", 0xd3}, {&(0x7f0000001f40)="0c963ec36f07b6f69dc796449c365524219836d3d4325bc455afc4beaa9fb89c74d2c7febbdc78c3e8c3c26c1e1929f4778fabd64d3e4212d6433d6f42198a95afb10c9680", 0x45}, {&(0x7f0000001fc0)="6b31d782c404227039ff5b5fcde63a0abf188bc3219a1cbec694fe143643f953d003e1788e96309bf227d6c88efb80b6444fa36517996f9b8c43fa33b5bbdeb5475521dd53dd2c030f842c8776643f428a1b94d21c877d43a5db80a4b3847f994f95d28845b296ea32d3937c8378a7bad5a8cc4466625ad8cc055a4f560adcfa718a245a2364d6f908f4fbfc98644064dbac4d3d42c8cadf76db70e492b66a9ce4aafffa07ca32c7b87c341cc9ec9d97b3fc59b43db6aa9621ba1e590b73f12685b78df830b55e9fa0a6411a48d4e3b6bb44d69328f5", 0xd6}, {&(0x7f00000020c0)="4bdb3a8d62f151f527e46246c9a9d5270c2f17251189862c5e66f9ee13370bc1ccd5f95c4d1abae400c1fbb390932a8beb7fbe7413254936c0d985420732617a699947c8a5d53c9d600170522e9d08fbe70910b3763b9afae5aba3acc846dd44078321b6ba56bb8951f375c9f0ead976f5", 0x71}], 0x5, &(0x7f00000021c0)={0x68, 0x10c, 0x81, "3e530035384078c8a475987f855038be83b67f8bf3fed98cedf9c8ca834ab5f275af6ee1b8090a3d5ea74e44fcc8251d96ee2d9f6eb09e1c063a3531a1043a6f4b60b64b208d293381f206508e9f14400205ca5e6cf6cc25"}, 0x68, 0x4000080}, {&(0x7f0000002240)={0x27, 0x0, 0x1, 0x5, 0xe5, 0x8, "f600dba646197a87a18105d02f52fa83cef9a229ae20ff9d37876fe75cc55bd155a02450dd1e53d3c4eff8192a1634a8d853bdbde9e7dc41b7f6617fd2552c", 0x3e}, 0x60, &(0x7f00000025c0)=[{&(0x7f00000022c0)="0576bc982c53f9b03c6e7a246a2beb611eab100bcb12dbc3e6c4ed2c3a235ebc52c9bdd6bcbd6cf0ded160f9cd2cfec7c1358f5485998b838c7f9f1d263cb351a419397d060b5899b3cd1b734b37e03039ba19a10efe5381cbb5ceec51aa8fce715760b4e5a81a4b78fddd39bf4e8c010d65de6c63b2609121e35a4d66e5722817880fcd0849f478e72daf60d0b44f16c422d70ce3ba1b83a97de3ec8f1cbb629edc0ebda1259fa932ff829b66d44ddb116d35a42e189b2181bb21831fb6edb1f749e70b37fff4d6a3de7ebb", 0xcc}, {&(0x7f00000023c0)="520e711ac46244d5120d41d669391c326ee263908d990d1d586ca60bf16a77ec52cd67ccdf3ffa0edc16f45bcd", 0x2d}, {&(0x7f0000002400)}, {&(0x7f0000002440)="0a8b78", 0x3}, {&(0x7f0000002480)="e4f6", 0x2}, {&(0x7f00000024c0)="c506e6602e6bdb0e9d9fd4ebcad06c755f52cfc46475b9e0f21e0ada0bd676b26782c4b640ddf4e17e8a41e93a1e7ab4b22cc0c274c5237e10850b420193c4665cfd8dd7e7206bde8174f2e17c73f0afe897e2a08be9b7a909e65c927e2c09874c8f3b721e1fa69129af9d6c2eb833f549a07f77d655c846daa75f98ad322bd0e107c75d721fe126469df4ad206d2728742ae895497310ca66719b0e9c7bbd797c15842c2226c3af16d40d8bea098cd8c47b9c1f0e365ac2c506c9c1f06cbfa026f023e2984e227a825fab21c36ca8ee6d6f34a29d112f05644a9f717a38a38fca32", 0xe2}], 0x6, &(0x7f0000002640)=ANY=[@ANYBLOB="370000000000000017010000080000000a967944f32518be1876062d73f3bd19a031f5d9d373a94100d5b0c74ef5eb6706f3e546ae951f36ca590543fc292dde9a66ab81acdaebe9b5489f3c7329c57bd570000000000000"], 0x68, 0x60000000}, {&(0x7f00000026c0)={0x27, 0x1, 0x0, 0x2, 0x6, 0x2, "84cccc217fab672de509e1042ff4dc64fe1a8e6ecd288560f41061b4062adb62d15e33df38cb58688332ace197ef26ed7fe051c2c893b85f09a464a2aeeb81", 0xe}, 0x60, &(0x7f00000047c0)=[{&(0x7f0000002740)="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", 0x1000}, {&(0x7f0000003740)="7775f89ff557f03ac3016711a8a368992f12f48cd61236494947d46c87b9845a63bf1e26108897191821437cc394289753750634e90192afc6d54a52f2212ddcbbee621f9d34b0512acec447b3dba32377b787b514d581a691cdc3b2", 0x5c}, {&(0x7f00000037c0)="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", 0x1000}], 0x3, &(0x7f0000004800)={0x78, 0x118, 0x257f9f6c, "c55a3c9520cf26a5e52714b0132fba46a21d6d763901d12e33c722d9004a716e5e80ca0f4b84bcc689672e3ab61643f98dfc237713fa99ba9990420a3f732dec270678dcfe4ccc07f8f76a16bfc61071506969ddbc2b5822bbc93406ec081faf89b09d1c"}, 0x78, 0x1c041}, {&(0x7f0000004880)={0x27, 0x8, 0x0, 0x6, 0x7f, 0x7, "24b00e57c7b08048fcadf2e6d0e56af5261145a069859caee710d2657d68be25541bace0fa79b329a8a2422e6e85f04545bf307e3118e3cc088fc7bcceb9ca", 0x2f}, 0x60, &(0x7f0000005c80)=[{&(0x7f0000004900)="ef26307cfc1164e9ffcaf92bc9b143293d602a5c3dd728b18ad2940261ab67dc7d3f0ff62776bed13184f554ff51e9492d7fe666520b6c56789a5bcc7e2561d4fb18f5ead8153055a4fdeec0af81ba66a99afb9ee2cd49", 0x57}, {&(0x7f0000004980)="ac9069e76313bce0b8d603ea8f42ac4a8f23c9d984afdcdbc78b93fdac1e033de5e0a51c5e5468faff818cacc00ec09665a5382329e5d22b4acdcea07e2367f2cbb5e1f7a736fe37667a5564b3c9330b6ace64bd03d6366a351874792a322086fb961d0ff828bd85809654c14f0006249b922077d0c29b39e85263e513f6e339ac69f3c86ebdaaf7608b659e9dc3d6416ebfdd0ec23042cb980d8919b3d3a785ca79adc50e04754b3f2046ce6a39c793baedce03b450bea3d02ab9b21b27ba6784", 0xc1}, {&(0x7f0000004a80)="f96778d3e71bfba10208b86da70471c48c843e73d943a0b4fac254b55eb9e6a9cb60632544bd5ce223ab1e190266033ff6b88bc8513e9f10cbd4a3c393d5aae88ce3db5e009b3f25112016c5cb0cb0d3e4b73c5a3dff89b9588db83615be172e9fdfec72fb97b138e2d333b350149aecbf7bc1df340153bbdf87309996af16a682a9afe276ce8a9529e651a2a9e1f9db84a359754a61130ffe430c3e4bddfb50e50a4f126882e47c72219c3645c2a78e5f61929a42abee767c19350d10a4b2cf00805fb7f00f25a91fafa0c7fd6b0dda065403d85cb11a058b3fcef7229f3c88e090fe1b51117d3193b27f001882a6dc958678c1171a9c6a7f78918f443b36cab0a7378e893a20dfc460c723ec20c0fd37ccccf53ba6404fbdaee9b3e75a2e1a67ceb3adf9ca89e6732a4186cd4286ef38921c31de0e1df3047773abe316d9ce96e6dfbb444d5003faca9e9cef5c86ee11c94305ba3d7268d69bf3abc82db717af61f64c516576478a8a11ad8a150f0077cc5ed3d84ea21d8f5b6e8e80ce3afcc1ba94b6c90c16831084851e5a4631d10d2b44ab80599cd370b1a8fd3212c95cef4184124b4d4ba251aa8d9c6114b78000c2e5179efc7f919b755e8217eade05e2c75c921ccf58ae843caf9ab249c8dcb5d3aba985bfafa4cc87a26c7cdf62b411048c6a52b116cdcebf4a38c6865d405e17fb3433c58ba763b4387a9735919e05520bf8576bdbec6b869d2c2264b2078c4be11fe1ec2033d6a89a748ce0e82fbbe1c32d81a044dd1394ef5772c468f04aa99a4bbb83e43cb91ab00c007b0794f4addd5c5224dd872ccc0b2e99b11a8e1f558ab0e5fdff6b2ab43123af058380568a9c2b20b6df74708f099ab039f2449cedd5d08ff119710adf3f6f6770beda61dbf2a2903531c6c9ae7571f5830e31b44c83e5f5691de258b44718f4052ebdb4e88a4546c07eadf38776740ae2e5ad142b9cc212d406a42f09e1a25a7943565fec34e1ae4f356265ce29ae97b1d79d81a4a790936f8a3836b5d6464ac9ef4a8564b622781054d98b1d294c4e76bbe7586b7ad7cb65c11511dafd9616c1d7424aad2a64b61842fdc800eb7d3c3ec4f0ff97ed4da446e25705a093add1d434b387ec02d12e069540e3776f98e099bbef84beb91fdf9ca6d01de28b12f7af4c498149c5eb5c38b477ee381bc88ea6589c1b6c6ff576ee8f5d00bd5b5069cf7cca3657e313eb05ddc3ccf2d71e436f03bb4c2380d8d260059d235943f0f5de5359124f9bce9a18d78d9b4c650db1ed60f66d7d0cd1b1ad29353d3c595887cf52a4179407c832456d17acf75136757af34086f8ee4583b9285549e7323fa2c2fa950f0b77ed27881c912e41b76bb8697abb23bec00d30506dc5bed45da97dd1ae9858165b709daaf39bbcbcd3308c7b9afd76ca10367b14e3c58a331b5c5e17d3aa29dc7dc624170813c09e765fabcd42d70430c4c86036aadd72268202681b44a7b85b29091cfcf46794b43b46f699b0e98633968890deab62c785e3eb77434eccf410280bd1f56a758f681a519954efab607d7df8b1e8df172c27b3b3fe1f445eef2764c76151dafbe49dea7db41bd709161776c5000c39b36c666764fe2c9fbe9c10500179163e183113b1b5b45ecf9e03ac9b56527f5590a84c586589b98254a44bd95ef68f355602496bf30aa25d72f9a144edc532b098cbde1a003cf9fb4aca23240efb632e99e45381e27894069782e4db07de41fa27706eb11edc7644db9615615043611636733345532d8b0362e4dcfc50daba8c4b4f04d5c735bb384fe6001057f7f9c2d74c01a8263f44c5e7d5c59e8f9b2bbb381da141d0d9ee24a2c438127318969810ac9cd519b43fb9c64b5fecbd78a7342a1c6bfa850fe6e3364d3c550e98e4b73680f0d13161332aa6376ee7f471930b7b508dfe311370963a598be13311f3e5a71817a5f0f2c21043f5dc75080d43a9e09b774bbc52e9ce5ef519e8a5cb954c1c2adbfe47fdb91b237d562f2f9e1fe65cfabd26a96501a751e7c898f78e06f744c8c314e60ce1559dc01340504d86ed35145d99d4c3866c93c9ddb52ff3a3f67c8aa3fc5d703fb4486d4afbf66f010052f3284376c1cced19e71eb3761fb5ce9573d67c630c3c6db158a3e712fe6c975473cd8ccd227f301af6eca42e9647d23942a03a4a4229fcbf48d44693101f4e0cbe7e404ae839d9d4f24db2c518b8bdea79d50cf93a53aa4760844642c4855b56e4094552eb62d812dda7d089676c42f1e7f09b8701a9e45a015e73d0237ca942699c4d304835dd5482b5350c0b79a7cb19c6eda9ff55489b6a1e534269bbd158cd9a1a0d0b3769c89f1fe5920501ab3e94d6be415503d255928ca1798376f813a10ec7768a4c860f34a5620125089476c4150ebffd54ac08ce64c14ae06d1e236b7b771206503f44c425daa2a12881d1d2ffdb4ef09a8f83ab40a2b53c2c5762e3f207fa8a0ffe5158be4c750dae193265a4def8d5916bf0c6827405f6754676e2cb3c051c8e9111fd3202dda233c3999edec0966f7ff22abc3bda6a6146df9d175da177433e73c7e26ce341f63eb9335f4061b9deefd15cb9ce54900612df2e592af4e96f7e2e405dc1d489a3dbbccf8a2a5d72deeec5bdeed9f7aa44f4b792f5bcb8d14339f8ca5a11b56acae554f64411c28c750e1cb3192144d038c7b1c46d5b97c69823f80cd47d916bd902cb7df4a3b4cf4dc5fdb5288bdc5e39392cc7a98f5ccd28393a2091e89a395e3bad7804733f29a9b5f2be7e1c99d3943183e503c3472230948f0694b098d23dc614363b106c69d416943521392de8e54b081c481ebb2d37bef8859c94e56e4b8848813de13905b4a5337ba788eeea94f40a14f08b4d43f97de353b95e7a020cedb90e3af6b248e6712b51253e824f638f69d7f738b2831ddc13bb07726bcd0d58c36a4013ba11b7f786e112de635242f791ac5ca2b72386cb08b87a6d457445d5a85205d58d0026dd3087e444d4d2f63b2f2f9c16f77ff20e09bcaa92088df1162efa332f06fafb3ff9409fa0a5c58a19f11274855cabc64ee20f01cbe65d88f6b22a997955d219426a58901abf55f13459b0873af5a03126d7da5cf91544cb7c2a13b745165d760d933b7e05b9beb6077d161451a4885e86097573b328a54d3bfc9dacf06d4678782ffa24e7f3028e0f1ee2d1551e77a03edf335407cc33ea908a9df3065f11310a138b113e0d69e5439cea8f0557c4513ab56721098914f3296acf2aff4b4b98a685b1b77aa95a702a10258ab109b89926b6f07700e02478e4603cd6d286a21dad5fbefcaa27a7fa64baa75c480e4520b548dfa05e5470005c2af6513a9b8cb4f1bccf3aee723be98c4b8a1e41daa98eb7ee2dbae6217706bad4ce0d5cad67ffe438c6f784fc69d4d1b44557d4a749396f06dcad82e29c04434d5053d63e3a9a97ab9cde555bed6f68240b558e63c5504783c71a64a46330ad03e4dae4acd48ef7e3c5b454a35939820e1fd0701759966fd7ee4d336f83a30afdc228d7de19967a3a2296b884616cfe0069f843b6056970840377b553cc055a8c138585256c3c9ef408bf3166056d1758342c4fd4884b6b2aa573ac776ba592bca05dcf2e017944f83483bbdd1e45760f6e9271217be027ac1962504de62085614b35f61bdece2d5cd82aa5e8c5708001a95a9200be611632fc53e218722f42e6f888954dc2eb5330f0678e49e9650b711a829f7d95099744752eb5f17e28a39a8580d08ac11bba09146b3c3584076f91cc06c0dfca4412a0403862520ac1983bf55912e55e41c05118bb10d5259395f0a9f30af9c506a350250924caa1c218ba29e0e28e89a281cf670bef379b9e60dca0fad2639fe298b38d58bce1956f677d424fd66a139990b0778ff3f9fa9d951d72478582a467798a3bed7d150d571e299ae34e16d048d4c9141e360b44005e0a134d7b25579214795001d4753181972a107942ac4a95dfa7a8aa2c6a2d7323a9d1f201578c8783b96ce8ac602a5a4114bb5fffb799f40f21d0015552dbf53f6732a1546ebb1cae61b0dff6d8d256fa1df4b0baa332c875a1433a604bfeb6cc2d76fde0599ffda0bb52faf1a23d13d0da9b19ceeb153b8f49fcf0d70f61a939c825378a8824e8d2aa80144b61ad6968ac689f8c63fd77a3d19dea5f0a4c6e7c3f973d675806138a9ff1770f81d582be8c42e38e96aeb6c3738b147b60b42d0ea2d86bbb8c1c4090ae894d2d663e55732eeafca83a63831b5eab125525b66623acd516f620a4829f6c5df9728ffd3deae6704986bf1d3c12156891496a85757b2a7f2846136717cb9be379c2993bf10443e5f8fa4fb44e76d92da5a42daeb390b7fb80919c43ba6dcdf5db1ab00e3871e5d2a8d01aed06c2a64f246c0dcd295aab0dff1504210a78139886542157368253edb7c7c1ab5a10b620e145fb45e9af2e49448542ef9df21a15f0b1ccf090736c8b452ce1d3e3f6d53f0dd710e8b3223e6c0d3a49cb3ce8a9ab4c3dbe30e60a85fe1c5268575244aad425fd11d12e6a1206fa9f4bc414aa9f247f03d23a8f5575c82d8b2a435a447a077fc1f8e7e1f3d80fe26123a046fb39a14006fa8957c89323a9f67ca7d74aa41ac683b26daee63f34aadc737e75245c970e645fe74fa11806e8fb556164d3b7276ece9723932e94da7a424bc6c18c381e8c5bea2d9d30a50a61b7d0b5e8e733a7d3b15e379ccea43db85c99324c010432e9873a9d1531d207d1eba535d36ae45de8d5144da455e42c572b75826790fd93cc3a7a65ec53f58e5b15e54df5d38d31cf919922b64196a068dd1e54bfd361b7f557767ddd14bfa88cf1d0d8ce459bc5425bdf3f143a445f8c9cb869579d62bdeb6e026a29c7dd9d6cc5d43edb5eb9aa009f19b46f4e3c27528a0e8405b3f48acbfdcf68cb4c5fc3c09ed21339b5eed985cb018906bdcb73a9872a27e4159675f922fe0bb7bb8ff2ddcd765f2f8ff829784f67a4c21fedcbad311a647a81cab96628311bd65a4fdec10ddaea2247c146f718b1ce648f39566d400268eb04c42f36efa419e12070786811f0028934174d9aec0f183b400811c6edd41146977181d439f0b3abcbb8a1e6f3bf1d4eabad16870f3da0c1c206e9fef18f27d440c7decf78d352388ac52db21749b1957cf98edd37c0efe116d21dd56e7cfd1891b707f468cd8b26f9278e9bb8916cca9901065c23052a0e950f403a29348a469c3a77dff26918b0f90ced30a78abf2bfdec872af93b2bc5d5d5dcb370e6deb6eef63fff21f74f36c23cf4ee13366895bcd4d6cfc743b917fa96a448038d700654cbde8b51bc92fc7248109f8a5a0e1db954a44c0a0ab12df6289c2d2798b347d83b4466377f4eaf481d091d15896ca82456efb677f96086e860497e0dd2ee95c26c414ac9524123da5766e198835cad660c44f02fd6850dba2f52d98cb137fdc2d65753957667e0cf64b2074295ab5beab1370486a79e9aeaff637e59723442aa42bb7ae7f78c42dac8efe55353f4fb8c6735ac679b6680cd64406ffede0a3ecd9b86eac7645e1f872133d5a62364e54c388ab952a06a59cb37dfea35ebdd6ececbea8e96c01b5ce19de12bdf5e08f42af9234cf3400e6d94266419a52af14f2990b9c2a45e277fbb6430f199bddbb14420c5d19944ae90cc63a5d10c67f53cf773ca2d464420ced7a2239518dc5bb5a1190d396b90d0cc41d2d5ad58f4b2ab807640124f7434790a9494610165731101833ce47febef9dec6f70942b9a8f209dae21", 0x1000}, {&(0x7f0000005a80)="c5ace6ab21e850210ca4839bf10c4b5358feee4e00ed0cbf677144db0667ee3a8e419cad0d2050ece0c6f5ec4fa7bb3a3886ce9a11e422a70f2c25a4175f36a27df8e9c9c1705944947c04f039d32cb55c1c7b30362fe7bc3ef9c0bb9e2551807d87f145cd526000683f551b3573f9e0a09e2898e721a9b76afc56cd0cc4a9064b35116d1ed3a95239891be452facb3781dd63ca9bd3bb063348bc09c99b1f45799832c2d97c6257bf6e49b76ef18294403e51d9399e6d97d66c694b152e9f246aa8b75afe5d6278328e3dfed0ed337153b5de17dc4ccaa222f7f019f800a383", 0xe0}, {&(0x7f0000005b80)="2f027d38171faf9808a1394d7b3a0a4ee7480547e01c620840825edccf21b1d9e05d84cb93304bf5747ee83040f7c0438af32475c027616f622743c8dd50cb46ffee8b481add21c6e8281072a068856a38da35b80434b9023a52862709e980a4d8b7276d8e503483155a8f59962966593347cf4347d956e9453a03256dd93673e111ceb24369a50504accdfcd78d38b6441f5a0397fe2b16ad6ecbe960c06f02da9f2ab7541254ad8dd2936c47a0363574ec7745de95e3cbd65f39f158795ca652afef26b002c0b0f2b5303786c646fd7331d75a6d958d09", 0xd8}], 0x5, &(0x7f0000005d00)={0x90, 0x109, 0x1, "22a5f30468ce097d36df9745344840e6005a278c67ad4ecd3452c043bbaad2974df11465ec41b2f0d6ef3d49a8a72967484051ca459875faf56e7fd8e2c323926083ce121ba28a5fed147eb26aecc0d027bfbfa1c42d500ece62661f0b00d176c97a7d9c93d398a9919d1bac467ffac55e9806fa7785a7197319fe99"}, 0x90, 0x40098}, {&(0x7f0000005dc0)={0x27, 0x1, 0x1, 0x3, 0x1, 0x4, "8574cf1d8e1ab4ad800b6c9a088a1829e5c4647046e45ef4176555290521e78e0914bec1d1c78138f9c5ed0836ea408afff7e545bbda5b99d304a98cef4d74"}, 0x60, &(0x7f0000005e40), 0x0, &(0x7f0000005e80)={0xb0, 0x3b, 0x6, "16f67fdc5f47a657972cced3f0b2b7ae6e1a3f8fa4fd6bee8781ca02e5ac21589e2f2c30ffee93fec2dd1b5356bbaf8531ba4b2398c8b9ac006798b000ae434cd9d9b34bcfa81e46799a90fbac98fcb23f0c32174813db15e31e4f0d268facd4368106ede63fb2e9ae23c966e3737d3f16156182c1a098e45d9fa95d66394048f2bfb1685a6204e0bdb78f1e76bf9cfba192c87fb64d993776f148"}, 0xb0, 0x4000080}], 0x7, 0x40000000) ioctl$VIDIOC_SUBDEV_S_SELECTION(r5, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x1, 0x4, {0x70, 0xdd9, 0x88b, 0x2}}) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) r8 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmat(r8, &(0x7f0000ffd000/0x3000)=nil, 0x1800) shmctl$IPC_STAT(r8, 0x2, &(0x7f0000007180)=""/123) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x2, 0x1) 08:21:09 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0xe) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000200)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000240)={r3}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x3b1c00, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x8400, 0x0) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x6, @mcast2, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x6bdff08a4bc02073, 0x4) sendmsg$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000100)) r5 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r5, 0x0, 0x0) connect(r5, &(0x7f0000000200)=@vsock={0x28, 0x0, 0x2711, @my=0x1}, 0x80) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r6, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='\x00\x00\x01\x80\x00(\x00@\x00\b', 0x8000000000030842, 0x0) write(r8, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r8, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(r6, &(0x7f0000000080)="be47e732a7f002873ee0", 0xa) r7 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x10000) ioctl$DRM_IOCTL_SET_MASTER(r7, 0x641e) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) [ 482.799757][ T8031] mmap: syz-executor.1 (8031) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 08:21:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce4"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000003b80)='/dev/cachefiles\x00', 0x80000, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000004500)={@mcast1}, &(0x7f00000050c0)=0x14) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRES64, @ANYBLOB="af51f707b4ed4d34cd1c0160b80e3fadb7202749e55005749f5b99d1c030e6514977b4275abc68876f676654c17f717b659d3afe9650152499b732e2dee48c0acb0800000000000000c66c9e35c8ae839bc4c36fae3ef990ae"], 0x8}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004f00)=[{{&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000002700)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/228, 0xe4}, {&(0x7f00000014c0)=""/117, 0x75}, {&(0x7f0000000080)=""/12, 0xc}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000000140)=""/1, 0x1}, {&(0x7f0000002540)=""/79, 0x4f}, {&(0x7f00000025c0)=""/93, 0x5d}, {&(0x7f0000002640)=""/185, 0xb9}], 0x9, &(0x7f00000027c0)=""/212, 0xd4}, 0x8}, {{&(0x7f00000028c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002940)=""/97, 0x61}, {&(0x7f00000029c0)=""/191, 0xbf}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/237, 0xed}, {&(0x7f0000003b80)}, {&(0x7f0000003bc0)=""/224, 0xe0}, {&(0x7f0000003cc0)=""/132, 0x84}], 0x7, &(0x7f0000003e00)=""/209, 0xd1}, 0x6}, {{&(0x7f0000003f00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000004100)=[{&(0x7f0000003f80)=""/179, 0xb3}, {&(0x7f0000004040)=""/180, 0xb4}], 0x2, &(0x7f0000004140)=""/225, 0xe1}, 0x8}, {{&(0x7f0000004240)=@ipx, 0x80, &(0x7f0000004540)=[{&(0x7f00000042c0)=""/145, 0x91}, {&(0x7f0000004380)=""/223, 0xdf}, {&(0x7f0000004480)=""/123, 0x7b}, {&(0x7f0000004500)}], 0x4, &(0x7f0000004580)=""/240, 0xf0}, 0x3}, {{0x0, 0x0, &(0x7f0000004840)=[{&(0x7f0000004680)=""/229, 0xe5}, {&(0x7f0000004780)=""/8, 0x8}, {&(0x7f00000047c0)=""/118, 0x76}], 0x3, &(0x7f0000004880)=""/217, 0xd9}, 0x8001}, {{&(0x7f0000004980)=@alg, 0x80, &(0x7f0000004e80)=[{&(0x7f0000004a00)=""/216, 0xd8}, {&(0x7f0000004b00)=""/49, 0x31}, {&(0x7f0000004b40)=""/29, 0x1d}, {&(0x7f0000004b80)=""/57, 0x39}, {&(0x7f0000004bc0)=""/200, 0xc8}, {&(0x7f0000004cc0)=""/140, 0x8c}, {&(0x7f0000004d80)=""/205, 0xcd}], 0x7}, 0xfa3b}], 0x6, 0x10020, &(0x7f0000005080)={0x0, 0x989680}) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r6, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r6, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:09 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x45621ef3f1bce709, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x0, 0x9, 0xbdc9, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r6, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r6, 0xc0096616, &(0x7f0000000340)=ANY=[@ANYBLOB="47ba1ad4c4cb64cce1a47c9323db45b9f2480100b1a51100f6a820cad7249000"]) syz_genetlink_get_family_id$fou(0x0) r7 = open(&(0x7f0000000240)='./file0\x00', 0x20082, 0x100) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000139b06, 0x0) write(r8, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r8, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce4"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(r6, &(0x7f0000000080)="be47e732a7f002873ee0", 0xa) r7 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x10000) ioctl$DRM_IOCTL_SET_MASTER(r7, 0x641e) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRES64, @ANYBLOB="f997a852417a221364e7826369dd3336be0c74d77271d5232569"], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce4"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) r3 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r4) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000200), &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) setresuid(r4, r5, r8) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:10 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e6"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40600, 0x0) read$alg(r1, &(0x7f0000000180)=""/225, 0xe1) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="021800000a00000000000000000000000300060000000000020000000002000000000000000005000500000000000a00000000000080ff02000000000000000000000000000100"/80], 0xfffffcf5}}, 0x0) 08:21:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000080)={0x7, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}]}) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3a, &(0x7f00000000c0)=0x2, 0x4) 08:21:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e6"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r3, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000200)) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000140)=0x6) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000080", @ANYRES16=r6, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r7, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r7, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:10 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r5, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$inet6(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r8, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r10, &(0x7f0000000040)="e0", 0xfffffe00) r11 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x101000, 0x22) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r15 = socket$inet(0x2, 0x4000000805, 0x0) r16 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r15, r16, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r16, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r16, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r14, 0x84, 0x0, &(0x7f0000000040)={r17, 0x0, 0x0, 0x8}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r17, 0x8001, 0x3}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f00000002c0)=@int=0x100000, 0x183) ioctl$TIOCSETD(r10, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) ioctl$TIOCGISO7816(r19, 0x80285442, &(0x7f0000000280)) 08:21:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r1, &(0x7f0000000340)="e07729515b51d440c699f335cf3e522a9b28b09621538d93d07c339eb4e3f095355f4d09abca673a802713506617264277d2a19079e85918ec48c64b4ed4e56d58666b99ae60af85ec9b70b112203bcc241a5e09f97c3e665d9af1dc4a9b939cc8dc092ba319ceb346384075f57adf769b6cae69fab1b574b301490170e30e9675f8170025344b6db77ad30b7a17c1a270a6cdcf9b5f83064ca15c937c2a4a7a65e113ae2418e8df931b1cd2b9c515175b26070a99baac6e238a9663be72673cb086b1b431", 0xfffffe37) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VFIO_GET_API_VERSION(r5, 0x3b64) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e6"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r3, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000200)) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000140)=0x6) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="24000080", @ANYRES16=r6, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r7, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r7, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:11 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000380)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000000000000005000000000000000000000000f8728987cc9fca8100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013743a9bcc9c279db2db0c9cbf36247031b72a8177c906340ab1fe3fe8bd4df5d2de6c42a698a5f0fd66c84f24f19a4ce8a3bbba8aeef018be67f26098164227d3"], 0x78) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x3, 0xfe) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0xfffffff5, 0x0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-monitor\x00', 0x4020c0, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfff5}}, 0x20080000) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f00000004c0)=0xc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x200808, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB="2c726f6f746d6f6465ac93dbd9fa9374d23d3030303030303030303030323034303030302c", @ANYRESDEC=r6, @ANYBLOB=',group_id=', @ANYRESDEC=r9, @ANYBLOB=',max_read=0x0000000000000001,max_read=0x0000000000000003,blksize=0x0000000000000000,uid<', @ANYRESDEC=r10, @ANYBLOB=',func=BPRM_CHECK,fowner<', @ANYRESDEC=r11, @ANYBLOB=',\x00']) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r3, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r4, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r5, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$inet6(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[]}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r8, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r10, &(0x7f0000000040)="e0", 0xfffffe00) r11 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x101000, 0x22) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r15 = socket$inet(0x2, 0x4000000805, 0x0) r16 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r15, r16, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r16, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r16, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r14, 0x84, 0x0, &(0x7f0000000040)={r17, 0x0, 0x0, 0x8}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r17, 0x8001, 0x3}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f00000002c0)=@int=0x100000, 0x183) ioctl$TIOCSETD(r10, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) ioctl$TIOCGISO7816(r19, 0x80285442, &(0x7f0000000280)) 08:21:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) lstat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r6, 0x400454ce, r7) write$FUSE_CREATE_OPEN(r2, &(0x7f00000003c0)={0xa0, 0x0, 0x7, {{0x3, 0x1, 0x7, 0x6, 0xab53, 0x1, {0x6, 0x9, 0x3, 0xfffffffffffffffd, 0x9, 0xc760, 0x1000, 0x2f, 0x9, 0x2, 0x1, r5, r7, 0x7fff, 0x10000}}, {0x0, 0x9}}}, 0xa0) r8 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r9 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r9, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r10, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r12, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r8, 0xc040564b, &(0x7f0000000080)={0xfffffff8, 0x0, 0x100a, 0x4, 0x7, {0x800, 0x8}, 0x1}) ioctl$TIOCSETD(r12, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:12 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c4"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:12 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c4"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:12 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x401004000000016) r3 = gettid() tkill(r3, 0x401004000000016) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = gettid() r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r7, 0xfffffc43, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xfffffffffffffc7e) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r8}, 0xc) getpid() r9 = openat$zero(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/zero\x00', 0x80401, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r9, 0x0, 0xffffffffffffff53, &(0x7f0000000440)='bdeq\x19\xd90de{\x00', r8}, 0xfffffffffffffef0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) r11 = fcntl$getown(r10, 0x9) syz_open_procfs(r11, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r14, 0x5441, 0x3) r15 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x820400, 0x0) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) fspick(r16, &(0x7f0000000240)='./file0\x00', 0x1) sendmsg$FOU_CMD_ADD(r12, &(0x7f0000000100)={0x0}, 0x0) flistxattr(r0, &(0x7f0000000340)=""/189, 0xbd) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r17 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r21) write(r21, &(0x7f0000000040)="e0", 0x19e59f3c) r22 = socket$inet6(0xa, 0x1, 0x0) r23 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r23, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r23, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) r24 = accept4(r23, &(0x7f0000000580)=@caif=@dgm, &(0x7f0000000600)=0x80, 0x81800) setsockopt$inet6_int(r24, 0x29, 0x31, &(0x7f0000000540)=0x5, 0xfffffffffffffe24) getsockopt$inet6_buf(r22, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r22, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000200)=0x4) ioctl$TIOCSETD(r17, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:12 executing program 5: clone3(&(0x7f0000000440)={0x9200000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000340), 0x9, 0x0, &(0x7f0000000380)=""/36, 0xffffffffffffff8d, &(0x7f00000003c0)=""/82}, 0x40) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/policy\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xffffff2b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r4}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0x0, r2, 0x0, 0xa, &(0x7f0000000540)='/dev/ptmx\x00', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, r0, 0x0, 0xfffffffffffffe89, &(0x7f0000000500)='/dev/ptmx\x00', r5}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0xae35}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x100800000000002, 0x0) r7 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r7, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) r8 = gettid() tkill(r8, 0x401004000000016) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0x1dd) syz_open_procfs(r9, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000600)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0xffffffffffffff01, 0x0, 0x1b0, 0x0, 0x245}, 0x40000843) r16 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r16, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r17 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r17, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r17, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 485.986238][ T9235] team0: Port device veth3 added 08:21:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c4"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x4000, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:13 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:13 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x8001, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x18) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) faccessat(r5, &(0x7f00000004c0)='./file0\x00', 0x10, 0x800) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r6 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r6, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRES64=0x0, @ANYBLOB="d19cd3166d3308cb1e4fb463f4713d104ae7891c0bc909799d88d33c13fbb58b35e6286daf563f69178bd5c68425891a80603ae99df218f950642223175bf7b02e9d52742266ed6e7b6c3819e1006bdc6aebdf6b8bb3372c01f49d4fc4627b694516a7a0c75bc86fb0b978cab2bce5c70c70e365fa121f82386f5259416bbd7555a50ad84f039df3b2040b94e7c4c670421af4bb6943ad88e6667b17df05498d7a9ffd2a4de55c2130e71568162d9829bf5df5b39d510927879bae912e265aaa4706e155a82d353a20a422a5b84b3bb03f3054460384c50a695bdc30e2"], 0x8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r10) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f0000000500)=[{0x15, 0x2, 0x0, 0x5}]}) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r11, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r13, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r13, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:13 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback, 0xfffffc00}, 0x1c) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x4d9a8fac706348cf, 0x9c) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000200)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) r6 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) finit_module(r6, &(0x7f0000000240)='\x00', 0x3) 08:21:15 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) lseek(r0, 0x3, 0x1) 08:21:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRES64, @ANYBLOB="920b7eb84445baf3d6bc41145ab34b51ab182f6cf5f16eaec100"/41], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x4000, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:16 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x3, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) [ 489.385684][ T9891] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) lseek(r0, 0x3, 0x1) 08:21:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() tkill(r1, 0x401004000000016) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0xffffffffffffffda, 0x3, {{0x0, 0x101, 0x3, r1}}}, 0x28) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) getsockname(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f00000003c0)=0x80) getsockopt$inet_dccp_buf(r4, 0x21, 0xf, &(0x7f00000004c0)=""/154, &(0x7f0000000400)=0x9a) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) sync() ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:16 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\xff', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x800, 0x0) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, &(0x7f0000000200)=0x9, 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000580)={{0x8, 0x6, 0x3, 0x200, '\x00', 0x8000}, 0x0, [0x504, 0x9, 0x100000000, 0xe4, 0x2, 0x8, 0x8, 0x7, 0x0, 0x3, 0x5, 0xbfd, 0x6, 0x5, 0x20, 0x7fffffff, 0x8, 0xffffffff00000001, 0x1, 0x6, 0x8, 0x5, 0x2, 0x9, 0xff, 0x9, 0x6, 0x1, 0x8, 0x30, 0xffffffff, 0x4, 0x4, 0x7fff, 0x5, 0xee4, 0x8000, 0x3, 0x6, 0x80, 0x0, 0x7ff, 0xff, 0x2, 0x4, 0x4, 0x0, 0x4, 0x7fffffff, 0x3, 0xfdc, 0x4, 0x3, 0x5, 0x2a, 0x0, 0x2, 0xf0, 0x1ff, 0x8001, 0x1, 0x0, 0x9e, 0x7ff, 0x40, 0x0, 0x1c0b, 0x36fa5d41, 0x4, 0x0, 0x7ff, 0x6, 0x3, 0x97d1, 0xfffffffffffffff7, 0xd0, 0x3ff, 0x5, 0x80000000, 0x2, 0x0, 0x7, 0x60000000, 0xd1, 0x3, 0xffff, 0x9, 0xbf6, 0x4c4990f2, 0xd9, 0x7, 0x6, 0x6, 0x231, 0x246, 0x0, 0x4, 0x6, 0x3, 0x7, 0x9, 0x100000001, 0x3ff, 0x8, 0x2, 0xec7, 0x1ff, 0xfffffffffffffffc, 0x20, 0xa3eb, 0x4, 0x400, 0x0, 0xa9e, 0x0, 0xedb, 0x0, 0x7f, 0x4, 0x100000001, 0x400, 0x7, 0x0, 0xfff, 0x5, 0x1, 0x8, 0x40], {r6, r7+30000000}}) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x4000, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) [ 489.860550][T10135] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:16 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) lseek(r0, 0x3, 0x1) 08:21:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 490.290876][T10249] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:17 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) [ 490.693921][T10516] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) dup(r1) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:19 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x1312f2fb027215c5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="28000000f1ff00080000000036b9bcfcbfe8405f9d4cbfec0100010000000000000000d4b550ff6efc951b35ce33f8347302de97f7d773d30be5c8d624eb121ed7bac6e69d6fec4a6896d4a72a1990a7386195cff5e42953b6ab13ba86a2fdb7a822efa7fd2459491f16289112410c492a91be307f9aabe104bb35d90426f5505d66b733a04f7c93720376c0c9bcba4f594c18dd855fb8d00a7d6602285777e06ec081350d83fc79c32eb9ff47cb556e2e90d64d5d8c10ebd98b005e7df63721e3db40aefb85ac6ee967434aa625297e21513dac05716f8cbd", @ANYRES32=r6, @ANYBLOB="0000ff000080a0920000000000000000"], 0x28}}, 0x0) recvfrom$packet(r3, &(0x7f0000000340)=""/137, 0x89, 0x1, &(0x7f0000000080)={0x11, 0x17, r6, 0x1, 0x1, 0x6, @broadcast}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VHOST_GET_FEATURES(r8, 0x8008af00, &(0x7f0000000240)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r9, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r9, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c0001007665", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 492.953596][T10642] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock [ 493.047724][T10683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65521 sclass=netlink_route_socket pig=10683 comm=syz-executor.1 08:21:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) dup(r1) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRES64, @ANYBLOB], 0x8}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc72030400000000000000000100000008000400426d40723a010000f3070002000a02"], 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) 08:21:20 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c0001007665", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 493.291192][T10878] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x20440}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) dup(r1) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c0001007665", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:20 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 493.806872][T11028] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c0001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:20 executing program 1: exit_group(0x3ff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="010400000000000000000c00000004000400ce5768c36c3c95a0d20b98c7bf9d47d7fb6c318b8281eac7a3f5d435a45c2799e9740a17d2aa7c2d68"], 0x18}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000a00)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000009c0)={&(0x7f0000000840)={0x150, r3, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf08d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x4, @mcast2, 0xe1e57f3b}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1fb6f826, @ipv4={[], [], @broadcast}, 0x9}}}}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ea4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040) dup(r0) connect(r0, &(0x7f0000000200)=@llc={0x1a, 0x311, 0x9, 0x80, 0x9, 0x1, @broadcast}, 0x80) r4 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r4, 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) getsockname(r5, &(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000080)=0x80) sendmsg$FOU_CMD_ADD(r6, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r7, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r7, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f00000003c0)={0x5, [0x6, 0x4, 0x8, 0x100, 0x0]}, 0xe) 08:21:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 494.003286][T11129] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:20 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c0001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 494.357865][T11307] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c0001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 494.540019][T11379] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:21 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:21 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x100000001}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r2, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd000100", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 494.936772][T11589] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock [ 495.057617][T11608] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) r1 = gettid() tkill(r1, 0x401004000000016) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xff, 0x5, 0x8, 0x8, 0x0, 0x3ff, 0x50a10, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x2, 0x766fc79}, 0x0, 0x7f, 0x5, 0x2, 0x6, 0x1ff, 0x1ff}, r1, 0xf, r2, 0x6) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) dup(r1) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd000100", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:22 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 495.324887][T11627] team0: Port device veth15 added [ 495.368997][T11732] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 495.479286][T11739] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd000100", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) dup(r1) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:22 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\xef', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 495.769481][T11855] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock [ 495.811798][T11814] team0: Port device veth17 added 08:21:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd0001000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:22 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 495.881933][T11869] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000140)={0x200, 0x9a4, 0x1ff, 0xff, 0x4, 0x6, 0x7f}, 0xc) lseek(r0, 0x3, 0x1) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 496.077007][T11885] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write(r3, &(0x7f0000000040)="e0", 0x1) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) dup(r1) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd0001000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:25 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='#ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/access\x00', 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fdatasync(r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r8, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r8, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r8, &(0x7f00000001c0)={0x40000013}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r12, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e20, 0x7fffffff, @dev={0xfe, 0x80, [], 0x29}, 0x4}, @in6={0xa, 0x4e23, 0x6, @mcast2, 0xffffffe1}], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) r16 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r16, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r16, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r17}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r15, &(0x7f0000000480)={0x5, 0x10, 0xfa00, {&(0x7f0000000280), r17, 0x2}}, 0x18) r18 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAXSEG(r18, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r10, 0x84, 0x6, &(0x7f00000000c0)={r19, @in={{0x2, 0x4e24, @broadcast}}}, &(0x7f0000000180)=0x84) 08:21:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd0001000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 498.531936][T12004] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 498.610115][T12007] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock [ 498.713085][T12024] SELinux: failed to load policy 08:21:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd000100000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:25 executing program 3: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='w+an1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 498.843582][T12081] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:25 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='%ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:25 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x5, @local, 0x1}, 0x1c) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RSTATFS(r5, &(0x7f0000000200)={0x43, 0x9, 0x1, {0x7ff, 0xffffffff, 0xff, 0x74, 0x7, 0x9d1, 0x3f, 0x3, 0x3ff}}, 0x43) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_msfilter(r6, 0x0, 0x29, &(0x7f0000000380)={@loopback, @multicast2, 0x0, 0x2, [@loopback, @local]}, 0x18) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd000100000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 499.173339][T12148] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd000100000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 499.310524][T12162] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:26 executing program 3: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='w+an1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:26 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='*ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$void(r3, 0x5450) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000080)=0x1) 08:21:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 499.655720][T12272] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock [ 499.655758][T12293] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:26 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:26 executing program 3: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='w+an1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="7a3000d04f", @ANYRES16=r2, @ANYRES16=r1], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 500.028661][T12316] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 500.240217][T12401] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write(r3, &(0x7f0000000040)="e0", 0x1) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:27 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='+ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000), 0x1, 0x0, 0x0, 0x80}, 0x4c00) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='\x00\x00\xf1\xff\xff\xff\xff\xff\xff\xff', 0x0, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x335004, 0x0) ioctl$USBDEVFS_SETINTERFACE(r5, 0x80085504, &(0x7f0000000340)={0x0, 0x5}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCSETX(r7, 0x5433, &(0x7f0000000240)={0x4, 0xa20, [0x94a, 0x8, 0x7, 0xb4dd, 0x8], 0x7}) setsockopt$SO_J1939_SEND_PRIO(r4, 0x6b, 0x3, &(0x7f0000000080)=0x5, 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x7, 0x4) 08:21:27 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 500.517692][T12547] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:27 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write(r3, &(0x7f0000000040)="e0", 0x1) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 500.792892][T12678] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:27 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='-ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 500.886130][T12784] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$GIO_CMAP(r6, 0x4b70, &(0x7f0000000340)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r8 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r8, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r8, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = dup2(r8, r10) setsockopt$ax25_int(r11, 0x101, 0x1, &(0x7f0000000080)=0x4, 0x4) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r12, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r12, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:27 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:27 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write(r3, &(0x7f0000000040)="e0", 0x1) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 501.331670][T12914] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) ioctl$TCXONC(r1, 0x540a, 0x5) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 501.460825][T12919] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:28 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='.ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:28 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x49, &(0x7f00000000c0)=0x386f, 0xff5e) [ 501.737730][T13141] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock [ 501.840861][T13150] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:28 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:28 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='0ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 502.201362][T13363] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x49, &(0x7f00000000c0)=0x386f, 0xff5e) 08:21:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IMGETVERSION(r3, 0x80044942, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x52f4576a0240c6a2, &(0x7f00000000c0)=0x2, 0x4) r5 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) r6 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f5", 0x5, 0xfffffffffffffffc) keyctl$unlink(0x9, r5, r6) r7 = add_key(&(0x7f0000000180)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) r8 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f5", 0x5, 0xfffffffffffffffc) keyctl$unlink(0x9, r7, r8) keyctl$link(0x8, r5, r7) [ 502.359517][T13385] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:29 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 502.696903][T13478] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:29 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='=ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x49, &(0x7f00000000c0)=0x386f, 0xff5e) [ 503.064638][T13625] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x3) dup(r1) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:30 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='Xecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 503.286535][T13689] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:30 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x4}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x3, 0x4) 08:21:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 503.688925][T13859] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:30 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 503.883369][T13876] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:30 executing program 3 (fault-call:14 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:30 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='\\ecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 504.174795][T13988] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:31 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 504.451322][T14039] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r2, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000080)={'syzkaller0\x00', {0x2, 0x4e22, @remote}}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 504.584927][T14117] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:31 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 504.858143][T14232] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:31 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='cecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 505.000494][T14275] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 505.335205][T14365] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000440)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)={0x164, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x57cb}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x401, @local}}}}]}, @TIPC_NLA_LINK={0xe4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa512343}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x4000}, 0x4040005) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x223401, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000380)={0x800, 0x4, 0x200, 0x6, 0x4, 0x9, 0x3, 0x3, r4}, 0x20) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r5 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r5, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r6, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r7, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r7, 0x5437, 0x0) 08:21:32 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='decurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 505.501598][T14371] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 505.773999][T14496] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000080)={0x80000000, 0x8000, 0x9b, &(0x7f0000000340)="fd3ab34dc5db332ba2db11fcf64ca7dffdf7c9e8890ed79d7dd4163f3384f17d62fe5093774bc96f8ce1c8210fde3804c333cef1adf659bfea3e1240597315a1f3dc95607ea8fbee3e94997b8afdc257c298c3f579e61493d278e2bf60ea8204216c1fc1fa2cdc41ee08413db37d265740a620547c4e97f02d1c933edbf8b9174165ddb451744ad6697dd7d6fb503c1c8bb5f3bc6a4b906833dd05"}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 505.929908][T14582] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x0, 0x0, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:32 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='iecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 506.163048][T14721] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 506.402990][T14805] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:33 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='lecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) chmod(&(0x7f0000000400)='./file0\x00', 0x12) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x249, 0x0, 0xffffffffffffff53}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000340)={0x4e6c5df4, 0x0, 'client1\x00', 0x1, "5746a62d783cf50f", "a0b08e37dfe5e6aa6f959dfbb1d7902fdf3c466ab49ba4abae91c9fcba985237", 0xffffffff, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f0000000440)={0x400, @remote}) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100020}, 0x2, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001500), 0x440, 0x0) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r7, 0x40047451, &(0x7f0000000200)=0x2) write(r6, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r6, 0x5437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCINQ(r9, 0x541b, &(0x7f00000004c0)) r10 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r10, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$inet6_buf(r12, 0x29, 0x6, &(0x7f0000001540)=""/14, &(0x7f0000000080)=0xe) setsockopt$inet6_int(r10, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) pwritev(r1, &(0x7f0000000300)=[{&(0x7f0000000500)="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", 0x1000}], 0x1, 0x20) [ 506.752850][T14959] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x400, 0xa90840) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000140)={0x3, 0x5, 0xff, 0x2, '\x00', 0x4}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0xfffffffffffffe98, 0x0, 0x0, 0x0, 0xfe2e}, 0x4a4ab06207a4af52) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720e34ff388ee971"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) 08:21:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 506.906229][T14973] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:33 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:33 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='oecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 507.175064][T15090] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 507.321675][T15117] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = msgget$private(0x0, 0x120) msgctl$IPC_STAT(r1, 0x2, &(0x7f00000004c0)=""/112) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="24000000e8eb38fb17a77f50e33daebe53920585223a901fa24c7638d8dbdb2fcff6b918bf36c1a53fc0c869a65bbd56892405f20ee6edbc00a80caca86f0bd714d11d746f8d11ae75f049dad0a2d9df0f8e3e34cd4247c859342cc6eac4180295dfcb6207a020b3421695662389fc45184c95ee79414159bf22ef77e478f7dabb30d6a13d91c7fa0dfbaba00678dab46742cc926e2d33", @ANYRES16=r3, @ANYBLOB="fc620304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc1002086}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x6c, r5, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcac}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x31}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x82}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xbf}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0xf}}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x240}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 08:21:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r0}) r5 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) sendmsg$FOU_CMD_GET(r5, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0, 0x1000001ee}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r6, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r6, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 507.499261][T15215] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:34 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(0x0, &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:34 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='pecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="d4d38e0e955893380c60e5bd96097025dac66caace25d4eb6d88376b2f76db5a", @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80000, 0x3f) r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000080)={@broadcast, @dev}, &(0x7f0000000200)=0xc) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 507.847446][T15440] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(0x0, &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:35 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='tecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:35 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x101000) perf_event_open(&(0x7f0000000200)={0x1, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, r0, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x5}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 508.338420][T15679] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(0x0, &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000080)=0x1) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:35 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='uecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xffffffffffffffc1, 0x20000) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 508.974195][T15828] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}, 0x800}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000080)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000200)={0x9, "71d3882d5babbfb1c2c02260204e65014d226aa42e288c48019e608b5a1875cb", 0x100, 0x5, 0x736, 0x4, 0x3}) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x200020, &(0x7f0000000380)={[{@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@xino_on='xino=on'}, {@index_on='index=on'}, {@default_permissions='default_permissions'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}], [{@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, '/dev/ptmx\x00'}}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r3 = semget$private(0x0, 0x1, 0x8) semctl$IPC_RMID(r3, 0x0, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:36 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='xecurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) [ 509.591119][T16099] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) [ 510.024283][T16272] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x6040003) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:36 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x20}, 0x1e042, 0x0, 0x0, 0x0, 0x20000000000000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$l2tp(0x18, 0x1, 0x1) recvmmsg(r1, &(0x7f0000002fc0)=[{{&(0x7f0000000380)=@l2, 0x80, &(0x7f0000000880)=[{&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000400)=""/67, 0x43}, {&(0x7f0000000580)=""/7, 0x7}, {&(0x7f00000005c0)=""/119, 0x77}, {&(0x7f0000000640)=""/43, 0x2b}, {&(0x7f0000000680)=""/249, 0xf9}, {&(0x7f0000000780)=""/198, 0xc6}], 0x7, &(0x7f0000000900)=""/120, 0x78}, 0x2}, {{&(0x7f0000000980)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000a00)=""/64, 0x38}, {&(0x7f0000000a40)=""/89, 0x59}], 0x2, &(0x7f0000000b00)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000001b00)=@can, 0x80, &(0x7f0000002f40)=[{&(0x7f0000001b80)=""/155, 0x9b}, {&(0x7f0000001c40)=""/124, 0x7c}, {&(0x7f0000001cc0)=""/218, 0xda}, {&(0x7f0000001dc0)=""/84, 0x54}, {&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/245, 0xf5}], 0x6}, 0x1}], 0x3, 0x0, &(0x7f0000003080)={0x77359400}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r2, &(0x7f0000000080)="dff84622ddf091dbcfba406357a3a16b1b08fe2b6a564eabb0a22b721131dc51605e53909f637d", 0x27) socket$inet6(0xa, 0x100800000000002, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup(r6) ioctl$RTC_EPOCH_READ(r7, 0x8008700d, &(0x7f00000030c0)) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x80, 0x2) write(r8, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r8, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000340)={0x7f, 0x7fffffff, 0x4f, 0xffffffc0, 0x200, 0x1}) [ 510.074322][T16240] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:36 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='s%curity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) [ 510.446295][T16374] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:37 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='s=curity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x1}, 0x0, 0xc, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="000026bd7000fcdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1010180}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x11c, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x4}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xee6e1298d7ec9349}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffeff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20048010}, 0x40084) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 510.618613][T16551] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 08:21:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 510.901253][T16569] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000540)=ANY=[@ANYBLOB="18000000", @ANYRES16=r2, @ANYBLOB="010400000000000000000c00000004000400ce5768c36c3c95a0d20b98c7bf9d47d7fb6c318b8281eac7a3f5d435a45c2799e9740a17d2aa7c2d68"], 0x18}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_MEDIA_GET(r4, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc000000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)={0xe4, r2, 0x22, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x351da890}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf48}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0xffffffffffffffe9, 0x1, 0xa}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x22}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}]}]}, 0xe4}}, 0x8000) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r5 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r5, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r6, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r7, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r7, 0x5437, 0x0) [ 511.165218][T16718] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:38 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='s\\curity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 511.333274][T16797] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r3, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000340)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) lstat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r5, 0x400454ce, r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r10) getgroups(0x3, &(0x7f0000000c40)=[0xee01, 0x0, r10]) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r11) getgroups(0x3, &(0x7f0000000c40)=[0xee01, 0x0, r11]) r12 = getegid() r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, 0x0) lstat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r13, 0x400454ce, r14) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r15, 0x400454ca, 0x0) lstat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r15, 0x400454ce, r16) fsetxattr$system_posix_acl(r3, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x6}, [{0x2, 0x6, r4}], {0x4, 0x4}, [{0x8, 0xa8efd99f77f989a2, r6}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}, {0x8, 0x4, r14}, {0x8, 0x3f885143f59f50, r16}], {}, {0x20, 0x4}}, 0x6c, 0x4) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 08:21:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) io_setup(0x0, &(0x7f0000000080)=0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x400, 0x0) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f0000000380)="40ee9f0f91f5c9f6b88e13f69cd91d5e5228d07e0e089d8ae99e7e3289b9d1ddd79ef4f80763b21f9eb360a53907942d5642031c5321e366d9b7e2ccc7d0a3a808fc2146ea3ab9eea2a244fcd5ef77caa9b984300746f1cc0708f2c53cbc04f29ca26801be726a286eac6e3fa475b3d1f50c9d13f4664b7728e41af204bbd4ff0765fe373dc3f6cfdb4fe2468fea5c38b32eca86f6a7ffda3a30d06cee0769f78a4633da2d", 0xa5, 0x0, 0x0, 0x0, r4}]) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) 08:21:38 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='s]curity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 511.708259][T16898] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:21:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="008f1f000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000000000000fcdbdf250300000014000900fe8000000000000000000000000000aaa3060f8f7fc4dc2124f19458a12880ff02e6cf220429dd07cac390a8bc968cc684f8c879224e141b50cd3051de885b7283700031bf608bde7e3899b9515726df65ce64703060230376a987f2b2b92931fb1c4783760abcdde1548082e576d6dd7ba64cb9108c785ea72bf712d477e4e8c86e1cb0fd189cb6846417c7c904abb18343343ee5e323e76c6f2748f98165f981"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) socket$inet6(0xa, 0x6, 0x40) [ 512.087709][T17145] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) io_setup(0xff, &(0x7f0000000080)=0x0) io_destroy(r3) 08:21:39 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sycurity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000200)={0x9, "71d3882d5babbfb1c2c02260204e65014d226aa42e288c48019e608b5a1875cb", 0x100, 0x5, 0x736, 0x4, 0x3}) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x200020, &(0x7f0000000380)={[{@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@xino_on='xino=on'}, {@index_on='index=on'}, {@default_permissions='default_permissions'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}], [{@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, '/dev/ptmx\x00'}}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r3 = semget$private(0x0, 0x1, 0x8) semctl$IPC_RMID(r3, 0x0, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 512.396405][T17265] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x1cd, 0x0}, 0x800) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:39 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='se%urity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 512.861626][T17494] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TIOCSETD(r8, 0x5437, 0x0) ioctl$TCGETS(r6, 0x5401, &(0x7f0000000200)) 08:21:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:39 executing program 5 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) getitimer(0x1, &(0x7f0000000080)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r2, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r2, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 513.315046][T17579] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="28ff240000002bc39e912d804fed9e3f16220792763624951decb7e84dbeb4dea0f2a293e80a3afb59864ca2c7d2a11a0f488b", @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000080)={0x3, r5}) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) [ 513.363507][T17598] FAULT_INJECTION: forcing a failure. [ 513.363507][T17598] name failslab, interval 1, probability 0, space 0, times 0 [ 513.388558][T17598] CPU: 1 PID: 17598 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 513.396490][T17598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.406554][T17598] Call Trace: [ 513.409863][T17598] dump_stack+0x197/0x210 [ 513.414220][T17598] should_fail.cold+0xa/0x15 [ 513.418831][T17598] ? fault_create_debugfs_attr+0x180/0x180 [ 513.424659][T17598] ? ___might_sleep+0x163/0x2c0 [ 513.429530][T17598] __should_failslab+0x121/0x190 [ 513.434486][T17598] should_failslab+0x9/0x14 [ 513.438997][T17598] __kmalloc+0x2e0/0x770 [ 513.443251][T17598] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 513.449510][T17598] ? fput_many+0x12c/0x1a0 [ 513.453937][T17598] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 08:21:40 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='se\\urity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 513.460189][T17598] ? strnlen_user+0x1ed/0x2e0 [ 513.464874][T17598] ? __x64_sys_memfd_create+0x13c/0x470 [ 513.470440][T17598] __x64_sys_memfd_create+0x13c/0x470 [ 513.475821][T17598] ? memfd_fcntl+0x18c0/0x18c0 [ 513.475837][T17598] ? do_syscall_64+0x26/0x760 [ 513.475858][T17598] ? lockdep_hardirqs_on+0x421/0x5e0 [ 513.490544][T17598] ? trace_hardirqs_on+0x67/0x240 [ 513.495583][T17598] do_syscall_64+0xfa/0x760 [ 513.500110][T17598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 513.500132][T17598] RIP: 0033:0x45a219 [ 513.509897][T17598] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 513.529497][T17598] RSP: 002b:00007f8b830daa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 513.529514][T17598] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a219 [ 513.529523][T17598] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 513.529532][T17598] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 513.529540][T17598] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b830db6d4 [ 513.529554][T17598] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000005 08:21:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001500)=ANY=[@ANYBLOB="0810000008000000205d6f05f094a75cfc308c911a49369101894e826539869b7e9afa545894839b273d391edc3cfdd266567efa304b022d14316519fe4e6c5310738056295ebe124eee1b35fefbe019a486906703ae9fc8ef3ef15135445b1353ea2d40da19adc0c33ace7965140172c3710b0ffb546df6b36c9a7f53d13a077cae5f6945e68810410a64074b5916aa62d1aab6ebe1350f9ea6cb47c909c30eec3c6ac97b51d926c54f26082bbb8fa53bbbae79bef1145324a35eddc9ce87bce03d95716e81f8d27bdb33c3996acd59a1718ddca17e12914f411ac69121890cbcc2dccbb1f49c3e110ecb656f6ba4999c8a4362c0d424a613f9d11f998b856a8e7157502065909cff91c62ac802d96cf92cbbb2092cdb72d83afdc31b549e7e740e9344c8f23ea12c67dbb801821ac69c6b861f65765ff6b7f23a440f6e60ec1bcf0bec8a421438e029421374bdbe34a1b5c711716a1d4d8d816dd3d7d65c0f6c0a39c4255fc64d0f6ad62160ce606217ca5d0964e7ffed20405aa97ce90d67363f7f857946b2d528b331a247b7df179f9fb10272bb0fb9636273f2f903fa78eb9c5fd886bd72702a2add13f664dcf0bdfef0f9d0cd58e242e484942527c1cd15b195000be476764da49f248562563444294226a1f7a63120e65138e0349aa5fb8d4b06cc8fbb929a8b108a28c494cd7162fa5f33e8789bcbeed4cc0fb0068a3f3ca9d4093d8130a8c2d61cc068043467883e51b8c3cb2b5eaa51417ed6833210b5a7ac87002ae5b0481b0710de47ef6a4557b84570511014c11d9c1143f07eef99ce45ad449c01ed884c9b2fccb340c34f13facec63059b82d82356f83ccae9234777b9406dc89a2b255d0c445b4ac6a3dabfd875e687e33583ff89b540d5cf1c7d65ded3c5be669dffc111eb59ee783262b59a45582afa88f0aaf9c7703e245b4d1171b70097b0c73d5f4492261b98b398a7a0e85b9538acfb16e7bfa127cb8ac3de14a0512b3f695cfb1d4ff406f8dd9eb647a71f877e81016ab3381b7c32bf895dca5f5c9e1389d95b1a2261a23b53d98af0e17e9d23cfd5cba4013a5cadd1009c6a7fdf13caab72b3f958a01dfb1058bd0dc35f911d5e47d85957f5a18888c2c9c2f829253e73fe7e6b2ed577b048b90da70216bf83f51b9a9e4b25c5980b986717ed691da1cd184fa67c2378dbd00a89aaa1cb0409b8a1390fdf0a1d7e6d649e4196751b6c4479eda8590e95c4b92c53da55d08b5f69bde1082cd728f1e4377a8c1a2b307fda866d33d64464cfd1e2fb216efbf75ad054b8331832cfdde3b19669db4c4e29bc45e169c27ba171a25dd132a8f2ec7b0ae289d05bb8d7f0619bbf84ee55b1562f6d9ea33a159d8c9c7171303abd373160d602cbb39e73f5cae5f65aa2c46212b19b25d6213995663dcfa0897b5ae2c43ab8f8eb49d9f06bf14161e6d818813fc1a10521e1d0462c9cd09d993ffe034202e4c506657571790460697b453ab47b5750803e8ecb39f42cab2cd93d6b3b2393978c81a4d92530950925d6a2cb305834fdbe26d7880cebb7b19ba5af7725dc8f09d93ab6d4d77ca67d4b1d82c4c580372a6d3f90125095f242802a7e493b06015881db108c2f912f23e4c3ed042b8fd11a2efeecabcdcd576fbbd1912b2c8c91b4477162de235e6cc63dcf7b3f0acfefaa07a50e4c3ef4df135e72ccd0d7d101ef9ce9a69d64d4c92a071190619d07a057eece2ba67f8bcb1164256b7648f6da2ef753e40fe4ba09f2505505e913d52131e7ee159206a66880704bb2cdcefb036c94fd566f5de0b34f31679a130bb9f199fd9b116562b40498f24a326d512e2ad898c4c3099bc0f06af54dfa6b3d6caefdf2050a6c6e5f17caa8008adcb9457cb203b849fafdf97d8a758c25db7ec50cfeb1aef35704890a1ffa07553fef002e0091cf513435ddec541c0b74c331c14f330331eac4dfe7d5537b1e7d23d223d80f73c53531aae958bc1588439387aef47fb3b0a0884c784a2cdaf6ea9c9810ab7ba86a14a233d965ce87a94abecce994d16ab3a4ebba0368e670ef8a7f48b37118a9e6af1bbaac697d64f4f7d83d1c4aff97f5f83c521df11d046cf22bc106b581501ba544a863b345ad7e509be6237d4762cd9858cfc69cf523bf40fd43f429d9650010e57ffa67feea5b8800f78b30f4c66768f7e1004e9471da6a769e169c8b6a5943e955d44fb41de0aff3c3809bc98bc2da6096384271ab2ffb319cae32a1c9a5a37e6239351e255ad4fcff7ae0a29824f1ef613bb92e03f0d7189fb98df5d9fb88f3b305da6c06c22fd66fb0a1332273af9760c2be79ed5c09880544a6044968b75c4de4583ecec059219f3974583df2806f25c794859552e38ec71b4681016889d5c8e17160037db21af4cd0e59928ff2118dfb8af1642720608b5bf37e1c11987c685070a40403a4500f7fedde5839f8ffb1bceef997d34e22ee4e74dccaa88217dd7131e5e0e1611daba210e4704cb76301ffd36f173ea98d1877d7b4c8c5abcbb72c8cdac49eee4bbd239e317e634c5fda5f0db671a73c6fd1f97addee6cf4cddcaa2a45a6124bf78e3e6e8b5985ffc36510f5b3e98956f8eaadaf931d7fc2bf2aa03a92c6a1091f06bdd02a8fef47aa24cab9b559d818a3e802d775afee944fc0147afa859e03e2c281437b90eb60eba7c79edcb6493f71049a893a07f58d3b68613db3c7e7b746e4b432a81943d515bb55af004f59ad02671beb781087fd7e68a3420a01cb2e6243c419f82ff4bf9e6ec2f17b7758ad911b22dd9028f3c437ff7a4fa70ce8fa5221da9ef6aff6e668643db3ebc271378673d77f51938d7b93d90a690471db76c5d1d2be388d7b30de9027ae1cdccb8df92e571dc95e94eefb4c77be5b1851fd6666bd5942786db165cf10130dba5f0e270f2e4c48182d8ef6fc43cc62bb797f797c2ce912d3d6a956ebcdb72eb2983e1cfe43cfce96feda9827186693324a253d1c57e50250b5c89275b7955e42079e5d032097352aa0c4b7948cc99400e1e9002f28f7aded08e675500ea8fcd4e014a2096f1cadd4d4d4b6cff78bbcbd563cf2f1a054150cd2661373aad2d8d3b31953e527660c5dbcc2374ef063d45b14469c7d47ce73ad02675eaa11c1460ae8d3be1bc1c9e3f3b8e87294493f084d972f1d41cc65f013c89b250abde43d0316610f96d7eed86f5753244ccc7c82bc1b92d6bfe83fbd5413fca16b7d900e57555a4de12863bf911740f9b00197b18a8ed682c62ca0b05950a67ce6d779128238b278c26a2b655400ea19c63fc417116eaf1d96ed0ca482111d40a3eb3d544609ac5db7f0f9b3bb55ee86d82da3981023b5e9bf1f28300b5e51ec97fa877dd1dbc74db4f40cadd80c717fcf029269ed30535b70a16205a876f0af06a2434b3b3d41bb09aa06d61ad1d6c31f7a545f0f10e7a2d077ea6633d49839d7b5ab6546045f27a091337184cf9190b3ae4da979ecc21001c541e5eba566e70208b5cdac73b83e9f54cd6e6231522763251c56e40edb964f5f4d6adf54a4803a3315e5417d0833b7daf66df59103f3963861bc24ca6d45b3d98ff82c347d1e79fbccbbdc592df9f2ab50503541925544ad77a1c985b79e01fb1093b450b5bfccb17d0f0a382fe1a593ccd9b41d8895e7367e760b8c9ae4535160db5c3a695e578a2b868848f512f5164e9031fdb4f64b1cefaf3fcccf8e306629872efc248eae863a8053ae2cd430dce886c4fa499e544655afdfcf323e0b0e36751b8972409fd2104cb8fb676289cce98a23377dfce2d314fec4baa6cde7e2bcdaacb438b280d6a906f74d2de5e6903681550e7ccf523e48ddaf7b416b7f85a384275d62174858fc9fb11839d54098fa7c96a05d0b73cb9cb6af8573e75796f2aa7758a6a2360c21e14708b0d4f55c0d124fa40b6477b5ffc34b8e7ff9d41be003406bb4779e6911456f3e1e526d19d5ddb4ee6bcc0eedc027c022f5ab41b11efd529ca04c7715f3728a9d43d36fdbef044c9cc359f8fbb9ba96394571be1b93d0924f428353db73819c6c8c31cc3239c032af6eb61ac40cd7a22b1fa50b24d3a2b43eaf1063eb2b47049a0ab0a69425baae7fe5d4803637b50f3a20e300e18d31d77b773065cd68e7d88247f49836639a8605a3387053e921bb58090e5f86717bab407821d810276b0861186ebee1a678209b4b00d0247ec92aad26ed051ed041efb6fb04c9d9ac2ab966c8f65f8c338b9098dd2119dac2d9c01463ba86b2aea2f3974f63bdb716d7f3f1407d915e7d0d8c4e1bc62c8a6b31022eab914cdfb240f6e7ede31a232b45d79aa6109b078d74d2e1fc6815ec128b32315e1017bf0fc1831bd57dc4c4bb7c9b885194f00f2f813eb4c40361837ce78156338332ad36ce58e12d0d8d1ee10b37ae6d0d4cb4799961a632d8cbb587984c09b2400b4c3a55f4bfbde8a1e77fe930c01502506b7518f44693f3cdeb8ce4dcbc381cbbb727da1b543fa2860d4531fd3f2bd686cdbb314f50115e76e443646463769b560901cfd4ff53fab29bea716ab07b0e24ae26a3795046c34ec7bf6727c7ef58d4d878d5645519f9870ab4c267478167b9ed95a54c39554f4b1f797be9fba4c40496015f1502d96d033a277bc52786ed87703cd1da61843236c2b5db82aabf38604e3929c1b500acacd591527e301482217361175f63a730116300dab1190625a64e9ba4c234f944c1027bc3a37c169eb9123ba661d0274949617b6b021f7fb93bf2a996e9e566fa1f9364b3e0422b28ef4fbf8672644594c38cd23c99b7a831193cb7ca05161dd141dd0af6c65a5c2f69e129ef44607bccc6720f400c366b66c36f68d7b594830b19c16e0782109f97f89acb7476deae28ae4fc7eb6b42a0d9e22aae5d8091e36539ea75dfd0e0a532cd8fd9447f33a57ececf738c9c8a658632f840dad21870baae6a1ec3f1228895ecfa9317555a29aa2fcecfb40c983a8249371f6d10b369cb1cb407520e31f03cfa68208754b83b59c0fc5be2d3de35d663f8ebd82252836c426e2dbe4cab097e1a16b669c50cb5e0d11b9ecc0fa51d199101c540ce4a787119cd8dba417a1f65b1d9ca2c4daf66132f83ec4be807269d5157b52f3db143d50050397f5c529d0107a8f035e4f5bb83847ac476e29bd36808a180b66e50476fc7eec2b9d73fc8434896b18aac018e33bd54683d28247a73ee79a2ad0b29de308181eeaac86dcb6b65e2f0978c79a7f49e86a8ff6db593c2353f69145593ec3b479f4aff89d84ffd8e6bc40ff3b36aaf2ab172b1d99330a08ef7e5cdf42d1c57563eb8a45cb18cb5e1a8014521760c3e962b4eeb70294f344d14d4ae7b84fcbfb774f0ccf3286ec15004786ecd2211d0af50186bc584cd46460c27f576b8b2fdf5ab6dc6934edc5a848a9c55386915c23401c555862bf3de5682ec2abeeef64ceb85ee0613811cc6f736a7017a1399b380934967a5e64e13fbb328df3f271c694d570fa1736ee4be0d8e399f80c1e37a97b63bcc2a0b8b0d4f40d2c1eaf592585925dd32a6f72df4eb79b8e01a059058c2c8b983d2dd657e81d44b83cf95465f3629280ba94ec323861a10148d226327a20cece0ca3816f75e1f89da7ce373b788034a993198ee8301f4b5db88ab38afc819cbe4b73209592a3635c9261184ac8c25a8491c35b29a91b8e72a3e6ff9e2d9657ec4eab81850154a8fb6d9b47115f00432c0fc0fc137df08894b8d29bdab0f7f506f940250fbfe61f8f0b0874bcb153ff95c6ac79ac61f4097292c2771cd69280a4108d51f42d5657e7da923b42c42c5c00"], 0x44000) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) r2 = pkey_alloc(0x0, 0x1) pkey_free(r2) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:40 executing program 5 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 513.924930][T17842] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:40 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='se]urity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 514.116740][T17983] FAULT_INJECTION: forcing a failure. [ 514.116740][T17983] name failslab, interval 1, probability 0, space 0, times 0 [ 514.182698][T17983] CPU: 0 PID: 17983 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 514.190644][T17983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.200705][T17983] Call Trace: [ 514.204007][T17983] dump_stack+0x197/0x210 [ 514.208467][T17983] should_fail.cold+0xa/0x15 [ 514.213068][T17983] ? fault_create_debugfs_attr+0x180/0x180 [ 514.218883][T17983] ? ___might_sleep+0x163/0x2c0 [ 514.223744][T17983] __should_failslab+0x121/0x190 [ 514.228686][T17983] ? shmem_destroy_inode+0x80/0x80 [ 514.233805][T17983] should_failslab+0x9/0x14 [ 514.238315][T17983] kmem_cache_alloc+0x2aa/0x710 [ 514.243177][T17983] ? __alloc_fd+0x487/0x620 [ 514.247688][T17983] ? shmem_destroy_inode+0x80/0x80 [ 514.252804][T17983] shmem_alloc_inode+0x1c/0x50 [ 514.257574][T17983] alloc_inode+0x68/0x1e0 [ 514.261907][T17983] new_inode_pseudo+0x19/0xf0 [ 514.266575][T17983] new_inode+0x1f/0x40 [ 514.266590][T17983] shmem_get_inode+0x84/0x7e0 [ 514.266610][T17983] __shmem_file_setup.part.0+0x7e/0x2b0 [ 514.266663][T17983] shmem_file_setup+0x66/0x90 [ 514.266682][T17983] __x64_sys_memfd_create+0x2a2/0x470 [ 514.290953][T17983] ? memfd_fcntl+0x18c0/0x18c0 [ 514.295727][T17983] ? do_syscall_64+0x26/0x760 [ 514.300530][T17983] ? lockdep_hardirqs_on+0x421/0x5e0 [ 514.305832][T17983] ? trace_hardirqs_on+0x67/0x240 [ 514.310869][T17983] do_syscall_64+0xfa/0x760 [ 514.315389][T17983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.321284][T17983] RIP: 0033:0x45a219 [ 514.325315][T17983] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 514.344926][T17983] RSP: 002b:00007f8b830daa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 514.353356][T17983] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a219 [ 514.361336][T17983] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 514.369314][T17983] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 08:21:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x1503, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000200)={'bridge_slave_0\x00', 0x3}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000240)={0xa, 0x6, 0x8, 0x2f}, 0xa) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) 08:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x36, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(0x0, &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 514.377289][T17983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b830db6d4 [ 514.385265][T17983] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 08:21:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:41 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec#rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:41 executing program 5 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(0x0, &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 514.781011][T18193] FAULT_INJECTION: forcing a failure. [ 514.781011][T18193] name failslab, interval 1, probability 0, space 0, times 0 [ 514.812686][T18193] CPU: 0 PID: 18193 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 514.820659][T18193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 514.830721][T18193] Call Trace: [ 514.834029][T18193] dump_stack+0x197/0x210 [ 514.838371][T18193] should_fail.cold+0xa/0x15 [ 514.842976][T18193] ? fault_create_debugfs_attr+0x180/0x180 [ 514.848799][T18193] ? ___might_sleep+0x163/0x2c0 [ 514.853662][T18193] __should_failslab+0x121/0x190 [ 514.858606][T18193] should_failslab+0x9/0x14 [ 514.863114][T18193] kmem_cache_alloc+0x2aa/0x710 [ 514.867982][T18193] ? __put_user_ns+0x70/0x70 [ 514.872558][T18193] ? percpu_ref_put_many+0xb6/0x190 [ 514.877754][T18193] security_inode_alloc+0x39/0x160 [ 514.882867][T18193] inode_init_always+0x56e/0xba0 [ 514.887789][T18193] alloc_inode+0x89/0x1e0 [ 514.892107][T18193] new_inode_pseudo+0x19/0xf0 [ 514.896769][T18193] new_inode+0x1f/0x40 [ 514.900822][T18193] shmem_get_inode+0x84/0x7e0 [ 514.905487][T18193] __shmem_file_setup.part.0+0x7e/0x2b0 [ 514.911023][T18193] shmem_file_setup+0x66/0x90 [ 514.915686][T18193] __x64_sys_memfd_create+0x2a2/0x470 [ 514.921041][T18193] ? memfd_fcntl+0x18c0/0x18c0 [ 514.925801][T18193] ? do_syscall_64+0x26/0x760 [ 514.930461][T18193] ? lockdep_hardirqs_on+0x421/0x5e0 [ 514.935729][T18193] ? trace_hardirqs_on+0x67/0x240 [ 514.940739][T18193] do_syscall_64+0xfa/0x760 [ 514.945240][T18193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 514.951114][T18193] RIP: 0033:0x45a219 [ 514.954992][T18193] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:21:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 08:21:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r3, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) sendmmsg$inet6(r3, &(0x7f0000001ec0)=[{{&(0x7f00000005c0)={0xa, 0x4e20, 0x87, @dev={0xfe, 0x80, [], 0x1a}, 0x37a9}, 0x1c, &(0x7f00000016c0)=[{&(0x7f0000000600)="3e40e23620ea00914445a16161e4e00495ca929d73b6f6765c1af4106e3a80e1b365768976700edb4646ad8990aac9d75a01ea41b6d2e2fd5dc14602d41f1b552f7532b99ceb5d31805f622b1b19bd4ab01ea9b0e0eeeb7a7f0c6ca05565d0b8ca890f05adac28803ee2a8318e35a910ba94dde8bf69bd403bb2a84c2437a08c845e003df2fa8597b8cf4a9e0aa0d16de150bea11f241489f2bbee8fac060e97bd443e17186761483bf09518a4e0e04710911a99a52c795ff94cac733c", 0xbd}, {&(0x7f00000006c0)="5ae6cbde21fa8e61a546378f92f3e478dd6be8a43fa6379c62ae68a899ebef58e3e0c98c8ae444ddc79aae32a5bb83ba0922f72d38dbefde3ced11695d3bff9ec6776bbdb25ce277abfb38fd30cba92d0cca2b5c6fad75947a516ac691383f2ba470e628c143fa236cd9a894aff7093588ebb1528ec1d86165ccb6458e39aa0b094afd7acbbbb9850e3920d7f1d9912dc3eb42f3034ff1dca9b23819070a4d59bd79f619484399c2ded17741e6e51a7bd8168df4b5d4788832f363ac0eaa9357c18ee5e4166541c85cb13f756618d398fc568ca2ca0765be0acc333f25619ad746ffcc3cd7dd6134778e43b75a90e8b3ce8c28edc979d50dec77b35d11ed2193ad971df06f5bcca42cad3f24acba4bcfea509e53604e8215b4d0a6b7b2bab01c2a550370c18c4e27c65ca8e5efd8b7193205b65e4db8206a0f47399c5b0911d3ba90aae2bdce3b2456886b3b0a50e64eaffa5bb048df97fe3cf036738b7ca8a2070d515262e4838a63324f4d28f96ce717335e0ae911f9d8410eae1c286703406e073915a2af06045c8f617dcdbab729bb54f93ad116e8adaac134abcf7797cf6da52263de03e036224a149afde80fe22350166acf3fb9f5ddd2e1e57b67c6cee14ea00464c3afbecfdf7cf357d782ed59abd09cb6f8629f8aa3b41395826e030d2e10288d2839e61d6cf84f59e2ac4af5efafac2ac257e140e32f991d2b48b33cde91d699f1f914f095a84192bbfddb288b80dc5a2d9b0856d4f9635b4d47cf2eeb8e904de5e53be4fe6fb0578328926de8f62294d61541e2b4ec54ecfd70755d701ccfc6af015b5ba560de7c3b502164d42a500f372d347102fba7242a3941357ad97cabd6413c45737fc9676ff5860df0b191f99a81e539cbdbe83918524fc7e0c0e9ee2deec172f04153d8ac220d63653471f0928e42f26df9bfb9cd597da12712ac97b38e93a8e2be657779a5a39a9901911154985b878c11a5d23d13b4520a79d8aeca6226cf866690dd859d4fba92a12ec53c25158a86240b2d01e38b3857259b58707e71d8ab7ba5ed26b031ee502213777f04e29855860059a63b69c3ec08f8f0c38535b2b724157f38a721c9cad246ab117a2b085341b7ec2513bf6a0e6f96429cf5f8b9964a607c2fe54326ba8d5998b2a3f008183e9412f25b6e913924cefff60a8ccf266c47e5d4b13f01865de6489cbdeed20e0272cb9ecffeb982c599abdcdb5ae2b126a86270fa2491d4ce39cb2decf50deb2b3284188b1fdb1060721d48c14742e1b1cac1f13184557e3f0da10f98fd09ab8d9c5ce97fdc9e0e48f2402cb6e4cb5da9040f9f1c0978fcd75b8c2eb2ca84de5649e2201cadb0ebeb647694dffb8ed7d9399e3e252be8b11562e9a7a2a3347da38ff8e1c60b56f3a844decc4182a5eb03f2c6e42b9ee03191f6b2401d28320d564b1d85f61ed710b3011758b5262dadef83e869895fb9da57d837aab96308949da07d4606897069ce360a5ad0490b8546998f6e136d6a3aaa268fa53b7f9c6eaadfe3eb33f37236e21b81d199c15d00679777be3c515e41e64f9057d74b6ffec089722e88ed1d935df7d742b1ad837b50952dc97af889395e1fc646e4312fdc1482f5a93f280f20641b1fb169d0f47d9b82b6acaaf908d133f5493289a4fc2e369dc831668ff4714e06bca26af3a2698a0ad8ad0be4b0c85e57296e6128e6c605ce2e48e0528352798232cd6bf73e03a8beb9d7a62a9d627ce5fef77a18c66abf1351f08eed0ca89a0390d768159476d17b3b1aee29718b6599d66c0e33ef9eaabcc01f62ccc6f3de28aa40d4c50bf072cdc4c22891b7d9a2c456afb43db33e52c2c1fc1edc6a32b205a299d088e96f257a251a95c01c1298937330705acf2f90739a72fa4bc490d602960d16142a17149706931c214395495a9a86b33116e300c13eb227ff3d663ad712168c8a0394143fc11a5051b7efd90808526db900c5333dba4188e406f9cfa1bcbc3f9dc8793d91b2dbed66e29d79fdcec3a271e83212ae74111b3c332d9f32ec53be58cb68761c7279716815515797a27a903d02a5db55a8a8abc4667662093304c843d90d6f673e296c7126528c45b01ec278e269362cd744f7813afed5992dbf3fbcfa783580048375e36c4bb53c1229d571c121132e65bbf78d37b97da5c68d50d99199a3b95bdc28dbc99d4f6a575c0b58a3613a54ede070d97ca33d185935aa43148d78f101e627068d7f959cac453d05068cfe1d5bec26ecb3c456775fb4b21546d2225658c511db7d56868943b43548218162311cfdb1f432f79761b250ade0df0667e82ac712e1da943f7182cb79951ea0349286c7a3c0bb8625e463d99b783e475ec2acceaff21fb0205e46f73cdb0c7259207ce5cf609cc5b8fbce6784ff714fca896cb1637a7d1a7c3089c49e2e578bf2e84afa678efb73492fd9532714b9533a091e23a035fdc59629501736f820ee8f65107d517c928b6dacf61aefb7f67eececd9813e00536ef41eccb7633ceb3116feb26b126955ba5272df7d1d78da4b2cecdb70a0a7569610a71327b537a09667d2023b2fac2d42208237c254495c4c20f32c940b0d3cf9883b10d34e71add3a0cae28fd433ae28832673145bd27bd7083a384a169778195e2ce36ee8a2b4f18fe376ba91d7cf5b7f31c917794039944f27f4458e69cdd4bced11678d601f32c928e549a37d148c99e20b52536304431b5aac1b87c0d2541a9914d3336ba8cfbbf834a61a7382f6b3b76b5d0c67f3200a60b3990712f5e61f538282999be27211083c94b1a1e1b7f18e47164ea2c26ccbb3039a4c1f7dd57b5182470d28d9ec90f54ba608a72ecd6652e690b5ff725d7f4240fee4341a0c883c70988bd8e9082c61fef5be712df3a0e0728b102fa5614d887823d328bbad52f4ec70bb1f1db6a1d4948734061eb8a044acdc6b8f440ffda5fb6fad55feb987d1a1fa3b37b29278f7382315450c1193b6fb509048eae354a44d5773407f6465965049861cf48f066df62fd84e50f5be24b93448793b57abeabf9e955a751ec5d68ed4701da274e93d08641f0b0c0bec1523bbaaa1ed9724ca0f0c4f31fcaa29462849585af003617746d3083b8529cc7a4ec7e97a3ecb2513bd458297ca097ff66ba1a62ee95652275d658d390a8d47d2a42f6378a24a5b3ccf4e768b352029735ac1ab6d42f6ff517ba75b08a5a3b9df2a1dbf4c7037af3dc3fa9927574e2cad4a226bc271cb7dfc270f5e80fad20857a3f598fd28b4919912616f3b8ba9242aa411b968ba974a9883dfb1ce9b04dd2b481484757357bfbff835bc32ccb4e1f05ce3d48b7ed4750e234cec40e06c667eeb90b131b59f7f5179762369b400305f6e5f8c7b7900e1070f5fc1c9fbd1d644146dc16168207be2de96d72ee4619dd24c6f6ce90fa229ad26ee4bc39d95a0fd99e21ecc69c26715d113725b049547fde9712d58758e61065ae440fe5a7fd19c5b831bd331f83e99c25c6a8054e355b0e836699d6bcdae9cce4f1d51f34a3b490ee4e1dfc2387d466cebce5b0dc67b5839319082ab6b73408573cb8a18cf0234c6ae24afb15e51ac6d02672e5dbf3cceb25e89681b2b30e3e4dd6d1c1e0b06980a568a5fe27b2c31952f22546619268ada3d907b7039bccd2dc30250f37c386b41f3b37bd4864b4d32d0fe2fa417565f72553c5d61044c0a6600dcebff3206c78011e246e8fd16b50c0781064c69a8d61777699b39e2007d4637e7515c55e0a2ea7e8e32ddc788592be3877d764dc6c3b4cf8ddf1709f51069129df5e684a649aeb7ffb0f90d48241dd444497d256742f7d419d15fe1b9a039e6597f6c984b424d79ba183bca33af5ecd25c062bf1621e6e1a01062376634c99aaabb7513070fe431afa5f417b86e3a63aa9270b920c91e7e028454ac7586ab8bf7db67fadc9e14e4d37e1acf35834cd5a4c83541162a7e1e0814b312d5977f753eec5729398a959bd9c733413fed29667538269d017139b08573b534a3899723682ce1aeeccaba3db533c5cb758c1ca44f38711cf0932cec60f572d4d8c6f58ed8a4d25df6817d32a1ac95104110040028343a2be051eaecd3531266fa3ec56b887bd954c14bcbaf74914fcb7c12dfb67273fb807f85b3a4e649c9275f0c38ddb2238154790ed739450036d7c8ed45264569aac875022c82437d856e1b6b71091425b5e3a352d2a906cf70de3333175d500d7f9cf8baa1daf433181cd1430e2097209239042a8ea7430830de1944cba0c88f1d13e5537e511bbf481dc5de5d8527482711b7baab3c4b6b46bbc146991ee7fb70aef7c510423c490c7cd690678dd4ff4806de71ae9af13a0df1ac97f4e9f592d0add922c1fe394494e2dd0d3d46b8698261e610561b9048ab327b0f75667e76f35d0726fc4ac0619f390bfbffe82e67087351b641519c1254c38045c85dbc36640f2ba9e0069abdd8c5f426ee721c463f40c3eaa8744bb6cf3e988f6ee8bfef95ffdf9b885c2be4cb0b99a9d6e10666f033ecc178661fbbcf147592dc370c563bd8b3eb641396a70583e12fed2212459cb090f6130ec82c7b9b242873f210608f5db9bac93c453fb1705c7a6affaeac62603fe3382f0cd2faa175fd26969d0d6e58fcb8fa1b865a1125ee83576895af13c35c930b7e0114cd9042e2b3a1cfa46d8f53ae8fc40eaa4d005cfb2df39d5394bcf0443eca5a77143f2b355d8c4d37be5e27c4534eaa5471732575319fa46ba5d8bcbe5471a32d5c4c501871e7d82823a32a058e589fe4f420b8269b6c41e570cffb1c0ad0c8db30d5bc58d0a4b063a81e9ecfd449664f25295bffbb074a145f9e99c145b9cdcefe17b31d8c64aa43e441b2fd9b2de700eb72c72fb2d615a19d81ca99d93e8ff0b04097b54e251a7782e0c619add95c918fa7da6a20b5dcdeb4315a301e06c02cb74694e62f16574d717c027be2e762da9375daea94fb6ee9b550a9846a3ecd940b2d833b30dd72a92de2e5f2871e78d5f959adaedad9ba1f61e767d4f13f1cbd32da1334aa9cd13f7888c589154ffb8683e8fcb3ecc7c7848710e1265895937e89803373587d011cf08c76921e33fd7294e5833a55f5addf70c288b56b9657db338bb8f016fa2ec17f8b2b3b0f6f30ec4b212bad9d982f003ada5dd642dac4e6a0b66752448268b19368950b5e471ad557066524e6a4a3f96986904d6ac6837441d1c14fe8b19a1ac139c15bbf7efe61b0dc24f06445cd2da4cb5108182c75933366823d95314d08fea5a8c7e39aa02e29bb3c979e7c8c22ebd497086a4aebb0540feda3c8ddeb40ede0db3a36b9c498f1ac6c82584c5c978d3567aaef2e9e32192b0448d253ea03e894ec32e0952399a0a4d75a1d364362dd19a35e59a6d948ea6fec8ae6e62ff5f715d3cce788e6214113090157bce16df0087ed998de7b7622a71170a6fc2856e240cbab629dd545efe6fa9e720729647d2f6faec22a05f81409e2aad1f2021c386d7b82d1f2f16801210f0f59aca94285db1e37b91184fd7c8d03de4f6c3c9d8f8d88ec9a508411e6fdb19445e1d6fc6e84add4d6b9bf2e15833bc3b034db6157914ae39b151bf5e86747f3ee8d1d3ff27df716cc63ac5aae01f495d83c6ef0d0cfd0e061b8116ab4ec8d1ea9d716bed8fac1b397ac75d003e6140c3b4fe035418aa46b52d19a10dab00ea9aa12f14bdf87a121f30487c2afa4caf9e7038f40d9403202d7d72e89a4e05ab71fe7f58885b32ec6717086d3da385a258037aec642a4325137b53869f0c5d90c3fc2c4e3", 0x1000}], 0x2, &(0x7f0000001700)=[@hopopts={{0x28, 0x29, 0x36, {0x3c, 0x1, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7fffffff}}, @hopopts={{0x20, 0x29, 0x36, {0x32, 0x0, [], [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x60}}, {{&(0x7f0000001780)={0xa, 0x4e24, 0x80000001, @loopback, 0x2}, 0x1c, &(0x7f0000001dc0)=[{&(0x7f00000017c0)="04a0416cc2edaf23431555baac2aec21cb4a653486b49808e67941f0a616f1c3ad71b4e1822ece0e921a700a1147fec789e416cb07d42c531498be91b85e134c24e046b67af2f04e81a0575eed1d4f9cca1eb80785fd50f87bdaaf912d083ca8ca2ea512", 0x64}, {&(0x7f0000001840)="b2201b3ed2a11288aa266d0620fab281cdd7680afbb1de484abbd1d70e32d645dbe29bfff75a442cb285a1e2619ff266389fd4952e3eb531340b2b484b2e4d6b62f0271df0e86df0f42d2d7a1160119fb08f16cff8a20d5a999adaac9d9c22668d78dd68a1e92b03b2c3028c7cab9741a64ad558528574469788519c738f5f2dd239ef4664f95617ce7293bfa6cb0dcad2844bce3f61bf478f70eac17b9e", 0x9e}, {&(0x7f0000001900)="6e3e4c9ea3b2800a7ad86c29f5a80ff1374c16ac768d98dd2a4924fe13022abaaff8e9e8ecce6dd404791c177e5774bef48cb9e3113bab7bf7f992d8f60dcc405cf7428f84bb7a4cba9f6318a86b5bf27091afb00a965fd478e95672180afbcc867fb8fffe6aa5cc36531b40623f3685afd1af84b4770ff62fd341dcdab9e09650132cbb2f8d40a0db06b573234ecc2e42298eee8577841f2f7cb7afc54c4d153a936a6e6aada60104db0ba90340b71f4e7d45c7c7ff2bc8eeefe112bed6e2a396a4230b4882429b233e45ff6f3733413d878613b4da77e33964238081335af14b15cf3f5615b51fd7ba", 0xea}, {&(0x7f0000001a00)="bee8d2b394a7654cefde9d82a059301652e0a40bde704e760f858a33a33cf831d61073af484b8b606796a75cbfca3fd2aa4777c631862e5b80e182cfadabe5f9cc1016b8419e55fcd1ac14", 0x4b}, {&(0x7f0000001a80)="0647b137e73216b734c7c392f1de19f06013f70d1f0214b4c51a961f7fecfc0c2505588f9e07c64b5cdbf6b82a1fdd1ddc26b012e246c76f5e15f02d533dea359d6f314dc8a020dbc1ccb23f98db459f49b0060df52f0fa4e41943d9648022bd2f65149d4dce9a877c0cd4144f3ee8833dac1544c8efe9259876a7557030aaeec6cea2f2d73a8d4fe6d950aa5235f410dbc540a3b90ca09fd4ea90ccfe6dfb4c78d5b51215dc3d7fe158e08cfc841c", 0xaf}, {&(0x7f0000001b40)="e76cf9c5e0430ef4874ac04a200682c1b621d8f9d1848fd23ce30ccafdb2ba42b6026fbadbd7135bd1a92064e041d81b9864895118ea34b7641a5aaae83c76d61350924c1e840ca2a11869d46c213b44269f4a06fea698ab14a01fa7206f7b131183bc33005518f40f5203dc9f958f0797e2", 0x72}, {&(0x7f0000001bc0)="b357789ba09957582601cd1449c7eb1d72c2ea74d3e27443db30de516bc2db2faf5c2d83c431cd5a01b4f4e3ef42555903edfd772e36926e1e96577c4769ec729e289f948f9403e33a659bc1060d", 0x4e}, {&(0x7f0000001c40)="92136ba88c39945a9c47a8e1cb48a7e823021c748bc44bea50060527a1a8ea12045de947d92576d0ea95a5d6f4cc385bce612a30a805236e70c6a1e3553e6b2c0459dd00bc793bcb8b10bf", 0x4b}, {&(0x7f0000001cc0)="2f4faebb9a894f9c56ca09c278d56f563e984c8ffe04d1fcab0f719024599814dde61f969e6ccd5ea9dfb0104ed9a110d72c9e0f2f4754bfcd68bea930049ca71b5edb2257c1f02327e16cfa2df952dead63f2878ab122c0015085cdf4b68f9aa34ecc287a9986a71998c765170a92c4a9da13bf0e42fc592198f8ac158c10f9714bce43cbf7a3902028d5fd", 0x8c}, {&(0x7f0000001d80)="047984ac2eda9725fb7c6149652ccb21580c8ecbb090690d5083ce328d649c4a7ea037", 0x23}], 0xa, &(0x7f0000001e80)=[@rthdrdstopts={{0x28, 0x29, 0x37, {0x32, 0x1, [], [@ra={0x5, 0x2, 0xbaf}, @ra={0x5, 0x2, 0x9}, @pad1, @pad1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}], 0x40}}], 0x2, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(r5, &(0x7f0000000580)={0xa, 0x4e20, 0x5, @empty, 0x6}, 0x1c) sendto$isdn(0xffffffffffffffff, &(0x7f00000004c0)={0x80000000, 0x3, "f3c4cbdd988157c6715c3a9ea4996560d3559e2c98a123b7739999d32c0b958026b115f2a8f8066ced2cff27d9846f373fe3def9032120e75261adc658e843036c34f13e8c9f1c362c60757200a29ddb2115"}, 0x5a, 0x4024480, &(0x7f0000000140)={0x22, 0x1, 0xe4, 0xf6, 0x9}, 0x6) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r6, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r7, 0x41009432, &(0x7f0000000380)="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") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r9, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000540)=0x4) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r10, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r10, 0x5437, 0x0) [ 514.974581][T18193] RSP: 002b:00007f8b830daa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 514.982975][T18193] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a219 [ 514.990929][T18193] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 514.998882][T18193] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 515.006842][T18193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b830db6d4 [ 515.014812][T18193] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 08:21:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(0x0, &(0x7f00000001c0)='./file0\x00', 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:42 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec%rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000080)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r5, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) setsockopt$inet6_int(r5, 0x29, 0xcf, &(0x7f0000000240)=0xffff690c, 0x2) 08:21:42 executing program 5 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) [ 515.507367][T18362] FAULT_INJECTION: forcing a failure. [ 515.507367][T18362] name failslab, interval 1, probability 0, space 0, times 0 08:21:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000001700)=0xe8) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xfe27) setuid(r3) syz_mount_image$exfat(&(0x7f0000000080)='exfat\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x2, &(0x7f0000000440)=[{&(0x7f0000000380)="b0cac252d38463efb1f0c6e738d86d2c3ea5fd7878a05588eb8fb1c7c656100bbaf98a1d99acb55010fda624729c39503ac50c87d5b134de6539b3b2d0b0629cdac8ab22b4652363b6df90b9847f9c2bcb708591dba5152ac97cea2953636c180c102aaaa3221b06f223633d362f6a977c1f73bc933bd064706a72b7a99dd29afd66e8f2b460c9a05baaaede9277d9", 0x8f, 0x1}, {&(0x7f00000004c0)="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", 0x1000, 0x46}], 0x1000040, &(0x7f0000001600)={[{@umask={'umask', 0x3d, 0xa13c}}], [{@uid_lt={'uid<', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vboxnet1-mime_type\x95&:(posix_acl_access/vboxnet1vmnet0md5sumvboxnet1'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@smackfsdef={'smackfsdef'}}, {@subj_type={'subj_type', 0x3d, 'fou\x00'}}, {@fowner_eq={'fowner', 0x3d, r3}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap(&(0x7f0000ee5000/0x1000)=nil, 0x1000, 0x1800004, 0x2aeb4800bb21a972, 0xffffffffffffffff, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xcc, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r6, 0x29, 0xd3, &(0x7f0000ee5000)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$inet6(r8, 0x0, 0x800) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r9 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r9, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r10, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r10, 0x5437, 0x0) [ 515.598572][T18362] CPU: 1 PID: 18362 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 515.606521][T18362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.616576][T18362] Call Trace: [ 515.619872][T18362] dump_stack+0x197/0x210 [ 515.624221][T18362] should_fail.cold+0xa/0x15 [ 515.628828][T18362] ? fault_create_debugfs_attr+0x180/0x180 [ 515.634647][T18362] ? ___might_sleep+0x163/0x2c0 [ 515.639514][T18362] __should_failslab+0x121/0x190 [ 515.644460][T18362] should_failslab+0x9/0x14 [ 515.648970][T18362] kmem_cache_alloc+0x2aa/0x710 [ 515.653834][T18362] ? current_time+0x6b/0x110 [ 515.658429][T18362] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 515.664244][T18362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 515.670489][T18362] ? timestamp_truncate+0x20f/0x2f0 [ 515.675697][T18362] __d_alloc+0x2e/0x8c0 [ 515.679860][T18362] d_alloc_pseudo+0x1e/0x70 [ 515.684364][T18362] alloc_file_pseudo+0xe2/0x280 [ 515.689229][T18362] ? alloc_file+0x4d0/0x4d0 [ 515.693743][T18362] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 515.700004][T18362] __shmem_file_setup.part.0+0x108/0x2b0 [ 515.705652][T18362] shmem_file_setup+0x66/0x90 [ 515.710338][T18362] __x64_sys_memfd_create+0x2a2/0x470 [ 515.715716][T18362] ? memfd_fcntl+0x18c0/0x18c0 [ 515.720485][T18362] ? do_syscall_64+0x26/0x760 [ 515.725169][T18362] ? lockdep_hardirqs_on+0x421/0x5e0 [ 515.730455][T18362] ? trace_hardirqs_on+0x67/0x240 [ 515.735487][T18362] do_syscall_64+0xfa/0x760 [ 515.739999][T18362] entry_SYSCALL_64_after_hwframe+0x49/0xbe 08:21:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x40800, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000240)={0x4, 0x24, 0x0, r1}) r2 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r3 = gettid() tkill(r3, 0x401004000000016) r4 = syz_open_procfs(r3, &(0x7f0000000380)='net/ip_vs_stats_percpu\x00') getsockopt$packet_buf(r4, 0x107, 0x5, &(0x7f00000004c0)=""/208, &(0x7f00000003c0)=0xd0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGRS485(r6, 0x542e, &(0x7f0000000340)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r8, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r8, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 515.740012][T18362] RIP: 0033:0x45a219 [ 515.740026][T18362] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.740039][T18362] RSP: 002b:00007f8b830daa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 515.769435][T18362] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a219 [ 515.769444][T18362] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf2b7 08:21:42 executing program 5 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 515.769453][T18362] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 515.769462][T18362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b830db6d4 [ 515.769469][T18362] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 08:21:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 08:21:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 515.974566][T18476] FAULT_INJECTION: forcing a failure. [ 515.974566][T18476] name failslab, interval 1, probability 0, space 0, times 0 [ 516.042835][T18476] CPU: 0 PID: 18476 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 516.050796][T18476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.060853][T18476] Call Trace: [ 516.064163][T18476] dump_stack+0x197/0x210 [ 516.068514][T18476] should_fail.cold+0xa/0x15 [ 516.073124][T18476] ? fault_create_debugfs_attr+0x180/0x180 [ 516.078950][T18476] ? ___might_sleep+0x163/0x2c0 [ 516.083815][T18476] __should_failslab+0x121/0x190 [ 516.083832][T18476] should_failslab+0x9/0x14 [ 516.083844][T18476] kmem_cache_alloc+0x2aa/0x710 [ 516.083858][T18476] ? rwlock_bug.part.0+0x90/0x90 [ 516.083874][T18476] ? lock_downgrade+0x920/0x920 [ 516.083892][T18476] __alloc_file+0x27/0x340 [ 516.083909][T18476] alloc_empty_file+0x72/0x170 [ 516.083926][T18476] alloc_file+0x5e/0x4d0 [ 516.083943][T18476] alloc_file_pseudo+0x189/0x280 [ 516.083958][T18476] ? alloc_file+0x4d0/0x4d0 [ 516.083978][T18476] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 516.137020][T18476] __shmem_file_setup.part.0+0x108/0x2b0 [ 516.142667][T18476] shmem_file_setup+0x66/0x90 [ 516.147357][T18476] __x64_sys_memfd_create+0x2a2/0x470 [ 516.152741][T18476] ? memfd_fcntl+0x18c0/0x18c0 [ 516.157510][T18476] ? do_syscall_64+0x26/0x760 [ 516.162196][T18476] ? lockdep_hardirqs_on+0x421/0x5e0 [ 516.167487][T18476] ? trace_hardirqs_on+0x67/0x240 [ 516.172510][T18476] do_syscall_64+0xfa/0x760 [ 516.177015][T18476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.182916][T18476] RIP: 0033:0x45a219 08:21:42 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec*rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 516.186812][T18476] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.206418][T18476] RSP: 002b:00007f8b830daa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 516.214844][T18476] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a219 [ 516.222820][T18476] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 516.230792][T18476] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 516.230802][T18476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b830db6d4 [ 516.230811][T18476] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 08:21:43 executing program 5 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 08:21:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:43 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec+rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 516.475878][T18666] FAULT_INJECTION: forcing a failure. [ 516.475878][T18666] name failslab, interval 1, probability 0, space 0, times 0 [ 516.532834][T18666] CPU: 1 PID: 18666 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 516.540778][T18666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.550836][T18666] Call Trace: [ 516.554139][T18666] dump_stack+0x197/0x210 [ 516.558488][T18666] should_fail.cold+0xa/0x15 [ 516.563095][T18666] ? fault_create_debugfs_attr+0x180/0x180 [ 516.568915][T18666] ? ___might_sleep+0x163/0x2c0 [ 516.573779][T18666] __should_failslab+0x121/0x190 [ 516.578722][T18666] should_failslab+0x9/0x14 [ 516.583222][T18666] kmem_cache_alloc+0x2aa/0x710 [ 516.588072][T18666] ? kmem_cache_alloc+0x364/0x710 [ 516.593130][T18666] security_file_alloc+0x39/0x170 [ 516.598156][T18666] __alloc_file+0xde/0x340 [ 516.602572][T18666] alloc_empty_file+0x72/0x170 [ 516.607337][T18666] alloc_file+0x5e/0x4d0 [ 516.611585][T18666] alloc_file_pseudo+0x189/0x280 [ 516.616543][T18666] ? alloc_file+0x4d0/0x4d0 [ 516.621051][T18666] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 516.621077][T18666] __shmem_file_setup.part.0+0x108/0x2b0 [ 516.621096][T18666] shmem_file_setup+0x66/0x90 [ 516.621112][T18666] __x64_sys_memfd_create+0x2a2/0x470 [ 516.621126][T18666] ? memfd_fcntl+0x18c0/0x18c0 [ 516.637758][T18666] ? do_syscall_64+0x26/0x760 [ 516.637777][T18666] ? lockdep_hardirqs_on+0x421/0x5e0 [ 516.637791][T18666] ? trace_hardirqs_on+0x67/0x240 [ 516.637810][T18666] do_syscall_64+0xfa/0x760 [ 516.667327][T18666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.673219][T18666] RIP: 0033:0x45a219 08:21:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000080)) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000200)={0xa, 0x0, 0x3a, 0x9}, 0xa) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0xfd, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000000000000fcdbdf21759fb8df4602cc13ff800000000000000000000000aa0000"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x8000000000000802, 0x0) ioctl$TIOCSETD(r4, 0x5437, 0x0) [ 516.677112][T18666] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.696711][T18666] RSP: 002b:00007f8b830daa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 516.705131][T18666] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a219 [ 516.713098][T18666] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 516.713107][T18666] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 516.713117][T18666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8b830db6d4 [ 516.713125][T18666] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 08:21:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 08:21:43 executing program 5 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 517.002352][T18833] FAULT_INJECTION: forcing a failure. [ 517.002352][T18833] name failslab, interval 1, probability 0, space 0, times 0 [ 517.037315][T18833] CPU: 1 PID: 18833 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 517.045254][T18833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.055314][T18833] Call Trace: [ 517.058617][T18833] dump_stack+0x197/0x210 [ 517.062961][T18833] should_fail.cold+0xa/0x15 [ 517.067566][T18833] ? fault_create_debugfs_attr+0x180/0x180 [ 517.073386][T18833] ? ___might_sleep+0x163/0x2c0 [ 517.078243][T18833] __should_failslab+0x121/0x190 [ 517.083174][T18833] should_failslab+0x9/0x14 [ 517.083203][T18833] __kmalloc+0x2e0/0x770 [ 517.083223][T18833] ? mark_held_locks+0xf0/0xf0 [ 517.096691][T18833] ? stack_trace_save+0xac/0xe0 [ 517.101551][T18833] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 517.107266][T18833] tomoyo_realpath_from_path+0xcd/0x7b0 [ 517.107280][T18833] ? tomoyo_path_perm+0x1cb/0x430 [ 517.107300][T18833] tomoyo_path_perm+0x230/0x430 [ 517.107310][T18833] ? tomoyo_path_perm+0x1cb/0x430 [ 517.107328][T18833] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 517.117874][T18833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.117909][T18833] ? rcu_read_lock_any_held+0xcd/0xf0 [ 517.145364][T18833] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 517.150657][T18833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.156903][T18833] tomoyo_path_truncate+0x1d/0x30 [ 517.161930][T18833] security_path_truncate+0xf2/0x150 [ 517.167219][T18833] do_sys_ftruncate+0x3d9/0x550 [ 517.172098][T18833] __x64_sys_ftruncate+0x59/0x80 [ 517.177040][T18833] do_syscall_64+0xfa/0x760 [ 517.181555][T18833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.187438][T18833] RIP: 0033:0x45a1e7 [ 517.191311][T18833] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.210891][T18833] RSP: 002b:00007f8b830daa88 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 517.219280][T18833] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a1e7 [ 517.227291][T18833] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000007 [ 517.235239][T18833] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 517.243223][T18833] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000007 [ 517.251174][T18833] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 [ 517.259624][T18833] ERROR: Out of memory at tomoyo_realpath_from_path. [ 517.272441][T18833] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:45 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec-rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', 0x0, 0x10001, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x28, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c008) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) recvmsg(r0, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/213, 0xd5}, {&(0x7f0000001640)=""/73, 0x49}, {&(0x7f00000016c0)=""/107, 0x6b}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/175, 0xaf}, {&(0x7f0000002800)=""/34, 0x22}, {&(0x7f0000002840)=""/25, 0x19}], 0x8, &(0x7f0000002900)=""/224, 0xe0}, 0x40010100) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000380)={0x8, 0x0, [{0x48a, 0x0, 0x81}, {0x0, 0x0, 0x4}, {0xc0010063, 0x0, 0x6}, {0x29a, 0x0, 0x2ba7}, {0x835, 0x0, 0x8}, {0x658, 0x0, 0x1f}, {0x484, 0x0, 0x9}, {0xb9e, 0x0, 0x3f}]}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) 08:21:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) 08:21:45 executing program 5 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x100800000000002, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSBRK(r3, 0x5409, 0x3) syz_open_procfs(0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f00000004c0), &(0x7f0000000500)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$GIO_CMAP(r5, 0x4b70, &(0x7f0000000200)) socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x963c}, 0x10) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(r6, &(0x7f0000000100)={0x0}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$TIPC_CONN_TIMEOUT(r8, 0x10f, 0x82, &(0x7f0000000540), &(0x7f0000000580)=0x4) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r10 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r10, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) r12 = dup(r11) getsockopt$inet6_buf(r12, 0x29, 0xfc, &(0x7f0000000340)=""/12, &(0x7f0000000080)=0x1000003b8) r13 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@local, @in=@empty}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) write(r9, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r9, 0x5437, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=0x2, 0x4) [ 519.108294][T18951] FAULT_INJECTION: forcing a failure. [ 519.108294][T18951] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 519.121543][T18951] CPU: 1 PID: 18951 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 519.129444][T18951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.139515][T18951] Call Trace: [ 519.142824][T18951] dump_stack+0x197/0x210 [ 519.147183][T18951] should_fail.cold+0xa/0x15 [ 519.151796][T18951] ? fault_create_debugfs_attr+0x180/0x180 [ 519.157619][T18951] ? is_bpf_text_address+0xac/0x170 [ 519.162837][T18951] should_fail_alloc_page+0x50/0x60 [ 519.168051][T18951] __alloc_pages_nodemask+0x1a1/0x900 [ 519.173429][T18951] ? __alloc_pages_slowpath+0x2920/0x2920 [ 519.179155][T18951] ? __kasan_check_read+0x11/0x20 [ 519.184187][T18951] ? fault_create_debugfs_attr+0x180/0x180 [ 519.189996][T18951] cache_grow_begin+0x90/0xd20 [ 519.194758][T18951] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 519.200476][T18951] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 519.206718][T18951] __kmalloc+0x6b2/0x770 [ 519.210956][T18951] ? mark_held_locks+0xf0/0xf0 [ 519.215721][T18951] ? stack_trace_save+0xac/0xe0 [ 519.220572][T18951] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 519.226285][T18951] tomoyo_realpath_from_path+0xcd/0x7b0 [ 519.231832][T18951] ? tomoyo_path_perm+0x1cb/0x430 [ 519.236870][T18951] tomoyo_path_perm+0x230/0x430 [ 519.241729][T18951] ? tomoyo_path_perm+0x1cb/0x430 [ 519.246764][T18951] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 519.252850][T18951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.259114][T18951] ? rcu_read_lock_any_held+0xcd/0xf0 [ 519.264487][T18951] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 519.269780][T18951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 519.276032][T18951] tomoyo_path_truncate+0x1d/0x30 [ 519.281057][T18951] security_path_truncate+0xf2/0x150 [ 519.286345][T18951] do_sys_ftruncate+0x3d9/0x550 [ 519.291203][T18951] __x64_sys_ftruncate+0x59/0x80 [ 519.296147][T18951] do_syscall_64+0xfa/0x760 [ 519.300663][T18951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.306565][T18951] RIP: 0033:0x45a1e7 [ 519.310465][T18951] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.330071][T18951] RSP: 002b:00007f8b830daa88 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 519.338493][T18951] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a1e7 [ 519.346471][T18951] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000007 08:21:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) [ 519.354444][T18951] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 519.362419][T18951] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000007 [ 519.370390][T18951] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 08:21:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) 08:21:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="4a13ff0d61cd71aea3f266369c74b662011c96f539bfe46ddfcd755e6e87f7b97008060412f8b742ed4f", 0x2a, 0x3}, {&(0x7f0000000240)="df6847d700539dbc1ab2ccf7c6f7d004d22096c8e7e692a2b5a49df371a9628b2eb3bde79016aea01525cc373816be6b41b75f67f9525b1593915e97c543a85ec7c82a608dac14575ba190d5ded5c3ef8d915fabf829b2969ec267df8d057ad0714e3d75306072edc0cdf0b407e327897fe9454c39d4a0500a78c2aef6806e64d6caa7c8f460c793e807af3db23a7f7d", 0x90, 0x3f}, {&(0x7f0000000300)="7dccc9d185331478cc7208b5edaa56c2e1a98bfb9195e5eb4acf5cf1e3e5025c333ced1ff9d1801316f9d829219d2bd20872bf3bc8e92d0d75fe88d59cfc3f82e06bf5e1f9c19d4b98ec8eb18603441b3ebe7b7f1a5d3d851f48c749a1bfb32c09973f372d09471bc762b0c6221e1e8b7386aaa9cde8d3b9e97486", 0x7b, 0x1}], 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 519.445366][T18951] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000040)={r8, 0x0, 0x0, 0x8}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000140)={r8, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r9, 0x8}, 0x8) r10 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r10, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) connect$can_j1939(r13, &(0x7f0000000080)={0x1d, 0x0, 0x0, {0x1, 0x0, 0x2}, 0xfd}, 0x18) write(r11, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r11, 0x5437, 0x0) prctl$PR_GET_KEEPCAPS(0x7) 08:21:46 executing program 5 (fault-call:3 fault-nth:8): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:46 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec.rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:46 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) socket$rxrpc(0x21, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 519.724452][T19181] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000210fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2759622f87074763ef8c3c6b0915ec1d32cd4fd6367e4d59c98610ebbf4ba2eb2a35308ff338832ca84b13a719c053724c5666747ea779d15dcb44508ed4fcff4d7e852ee9b3ce469c2a538e65fc994c45b"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) 08:21:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) [ 519.892581][T19195] FAULT_INJECTION: forcing a failure. [ 519.892581][T19195] name failslab, interval 1, probability 0, space 0, times 0 [ 519.995524][T19195] CPU: 0 PID: 19195 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 520.003451][T19195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.003459][T19195] Call Trace: [ 520.003481][T19195] dump_stack+0x197/0x210 [ 520.003506][T19195] should_fail.cold+0xa/0x15 [ 520.003527][T19195] ? fault_create_debugfs_attr+0x180/0x180 [ 520.003551][T19195] ? ___might_sleep+0x163/0x2c0 [ 520.003573][T19195] __should_failslab+0x121/0x190 [ 520.003590][T19195] should_failslab+0x9/0x14 [ 520.003601][T19195] __kmalloc+0x2e0/0x770 [ 520.003616][T19195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.003636][T19195] ? simple_dname+0xd1/0x1f0 [ 520.050114][T19195] ? tomoyo_encode2.part.0+0xf5/0x400 [ 520.050134][T19195] tomoyo_encode2.part.0+0xf5/0x400 [ 520.050153][T19195] tomoyo_encode+0x2b/0x50 [ 520.050172][T19195] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 520.081524][T19195] ? tomoyo_path_perm+0x1cb/0x430 [ 520.081546][T19195] tomoyo_path_perm+0x230/0x430 [ 520.081563][T19195] ? tomoyo_path_perm+0x1cb/0x430 [ 520.091409][T19195] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 520.091447][T19195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.108735][T19195] ? rcu_read_lock_any_held+0xcd/0xf0 [ 520.108754][T19195] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 520.119379][T19195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 520.125620][T19195] tomoyo_path_truncate+0x1d/0x30 [ 520.125639][T19195] security_path_truncate+0xf2/0x150 [ 520.125659][T19195] do_sys_ftruncate+0x3d9/0x550 [ 520.125680][T19195] __x64_sys_ftruncate+0x59/0x80 [ 520.125697][T19195] do_syscall_64+0xfa/0x760 [ 520.125716][T19195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.125726][T19195] RIP: 0033:0x45a1e7 [ 520.125739][T19195] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.125746][T19195] RSP: 002b:00007f8b830daa88 EFLAGS: 00000213 ORIG_RAX: 000000000000004d [ 520.125759][T19195] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a1e7 08:21:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$GIO_CMAP(r8, 0x4b70, &(0x7f0000000080)) r9 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r9, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r10 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="28000500", @ANYRES16=r10, @ANYBLOB="000000000000fcdbdf250000000014000900fe8000004000000000000000000000aa6cb5321fcc70d37070e0859ffb8ea3b59efe3348d2f585a584ba1613aa96db13e26c22391d63a4c95a645d532f206ddde1de3b6c748bbb597db3583d2d618e1b75d0ac394e991c16c1083533ab7ce1ac782fba"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r11, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r11, 0x5437, 0x0) [ 520.125767][T19195] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000007 [ 520.125776][T19195] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 520.125789][T19195] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000007 [ 520.160037][T19195] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 [ 520.211058][T19195] ERROR: Out of memory at tomoyo_realpath_from_path. [ 520.256177][T19195] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock [ 520.258544][T19310] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:47 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x4, &(0x7f0000000180)=0x0) ftruncate(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000000)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, 0x0, {0x1}}, 0x18) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(0x0, &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@local}}, 0x0) stat(&(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) setxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1) request_key(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1c00, &(0x7f0000000540)=[&(0x7f00000000c0)={0x23, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:21:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0x40}}, {@noacl='noacl'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection', 0x3d, 0x4}}, {@fault_injection={'fault_injection', 0x3d, 0xfffffffffffffffe}}], [{@seclabel='seclabel'}]}) 08:21:47 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec0rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 520.660710][T19522] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock 08:21:47 executing program 5 (fault-call:3 fault-nth:9): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r6, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000080)={0x24, r7, 0x403, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r7, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x58, r7, 0x7b1, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xd}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}]}, 0x58}, 0x1, 0x0, 0x0, 0x18004}, 0x808) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 520.970465][T19618] FAULT_INJECTION: forcing a failure. [ 520.970465][T19618] name failslab, interval 1, probability 0, space 0, times 0 [ 521.012953][T19618] CPU: 1 PID: 19618 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 521.020892][T19618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.030957][T19618] Call Trace: [ 521.034264][T19618] dump_stack+0x197/0x210 [ 521.038615][T19618] should_fail.cold+0xa/0x15 [ 521.043222][T19618] ? fault_create_debugfs_attr+0x180/0x180 [ 521.049044][T19618] ? ___might_sleep+0x163/0x2c0 [ 521.053909][T19618] __should_failslab+0x121/0x190 [ 521.058851][T19618] should_failslab+0x9/0x14 [ 521.063357][T19618] kmem_cache_alloc+0x2aa/0x710 [ 521.068215][T19618] ? stack_trace_save+0xac/0xe0 [ 521.073068][T19618] ? stack_trace_consume_entry+0x190/0x190 [ 521.078882][T19618] __alloc_file+0x27/0x340 [ 521.083306][T19618] alloc_empty_file+0x72/0x170 [ 521.083327][T19618] path_openat+0xef/0x46d0 [ 521.083341][T19618] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 521.083353][T19618] ? kasan_slab_alloc+0xf/0x20 [ 521.083363][T19618] ? kmem_cache_alloc+0x121/0x710 [ 521.083380][T19618] ? getname_flags+0xd6/0x5b0 [ 521.092528][T19618] ? getname+0x1a/0x20 [ 521.092543][T19618] ? do_sys_open+0x2c9/0x5d0 [ 521.092555][T19618] ? __x64_sys_open+0x7e/0xc0 [ 521.092577][T19618] ? __kasan_check_read+0x11/0x20 [ 521.131057][T19618] ? mark_lock+0xc2/0x1220 [ 521.135480][T19618] ? __kasan_check_read+0x11/0x20 [ 521.140512][T19618] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 521.145907][T19618] ? __alloc_fd+0x487/0x620 [ 521.150421][T19618] do_filp_open+0x1a1/0x280 [ 521.152278][T19682] erofs: (device loop0): erofs_read_superblock: cannot find valid erofs superblock [ 521.154924][T19618] ? may_open_dev+0x100/0x100 [ 521.154942][T19618] ? lock_downgrade+0x920/0x920 [ 521.154957][T19618] ? rwlock_bug.part.0+0x90/0x90 [ 521.154977][T19618] ? __kasan_check_read+0x11/0x20 [ 521.154995][T19618] ? do_raw_spin_unlock+0x57/0x270 [ 521.188799][T19618] ? _raw_spin_unlock+0x2d/0x50 [ 521.193662][T19618] ? __alloc_fd+0x487/0x620 [ 521.198187][T19618] do_sys_open+0x3fe/0x5d0 [ 521.202615][T19618] ? filp_open+0x80/0x80 [ 521.206864][T19618] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 521.213111][T19618] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 521.218568][T19618] ? do_syscall_64+0x26/0x760 [ 521.223246][T19618] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.229309][T19618] ? do_syscall_64+0x26/0x760 [ 521.233990][T19618] __x64_sys_open+0x7e/0xc0 [ 521.238496][T19618] do_syscall_64+0xfa/0x760 [ 521.243006][T19618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.248889][T19618] RIP: 0033:0x413fb1 [ 521.252785][T19618] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 521.272386][T19618] RSP: 002b:00007f8b830daa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 521.280795][T19618] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413fb1 [ 521.288764][T19618] RDX: 00007f8b830dab0a RSI: 0000000000000002 RDI: 00007f8b830dab00 [ 521.296735][T19618] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 521.304710][T19618] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 08:21:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) ptrace$cont(0x18, r3, 0x80000000, 0x2) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) 08:21:48 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secXrity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 521.312685][T19618] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 08:21:48 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) socket$rxrpc(0x21, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 08:21:48 executing program 5 (fault-call:3 fault-nth:10): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:48 executing program 0: pipe(0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x185404, 0x0) 08:21:48 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x4, &(0x7f0000000180)=0x0) ftruncate(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000000)) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, 0x0, {0x1}}, 0x18) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(0x0, &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@local}}, 0x0) stat(&(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) setxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1) request_key(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1c00, &(0x7f0000000540)=[&(0x7f00000000c0)={0x23, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 521.779478][T19851] FAULT_INJECTION: forcing a failure. [ 521.779478][T19851] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 521.792732][T19851] CPU: 1 PID: 19851 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 521.800626][T19851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.810690][T19851] Call Trace: [ 521.813994][T19851] dump_stack+0x197/0x210 [ 521.818343][T19851] should_fail.cold+0xa/0x15 [ 521.822950][T19851] ? fault_create_debugfs_attr+0x180/0x180 [ 521.828775][T19851] ? __kasan_check_read+0x11/0x20 [ 521.833810][T19851] ? __lock_acquire+0x16f2/0x4a00 [ 521.838847][T19851] should_fail_alloc_page+0x50/0x60 [ 521.844050][T19851] __alloc_pages_nodemask+0x1a1/0x900 [ 521.849428][T19851] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 521.855090][T19851] ? __alloc_pages_slowpath+0x2920/0x2920 [ 521.860810][T19851] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 521.866456][T19851] ? fault_create_debugfs_attr+0x180/0x180 [ 521.872269][T19851] cache_grow_begin+0x90/0xd20 [ 521.877031][T19851] ? getname_flags+0xd6/0x5b0 [ 521.881749][T19851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 521.887995][T19851] kmem_cache_alloc+0x64e/0x710 [ 521.892853][T19851] ? do_sys_ftruncate+0x41e/0x550 [ 521.897889][T19851] getname_flags+0xd6/0x5b0 [ 521.902398][T19851] getname+0x1a/0x20 [ 521.906298][T19851] do_sys_open+0x2c9/0x5d0 [ 521.910719][T19851] ? filp_open+0x80/0x80 [ 521.914958][T19851] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 521.914976][T19851] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 521.914991][T19851] ? do_syscall_64+0x26/0x760 [ 521.915007][T19851] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.915018][T19851] ? do_syscall_64+0x26/0x760 [ 521.915040][T19851] __x64_sys_open+0x7e/0xc0 [ 521.942089][T19851] do_syscall_64+0xfa/0x760 [ 521.951061][T19851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.951073][T19851] RIP: 0033:0x413fb1 [ 521.951090][T19851] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 08:21:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, 0xffffffffffffffff, 0x0) mq_timedsend(r1, &(0x7f0000001100)="d8", 0x1, 0x0, 0x0) mq_timedreceive(r1, &(0x7f0000000000)=""/4096, 0xfffffeeb, 0x0, &(0x7f0000001000)={0x77359400}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r6 = gettid() fcntl$lock(r5, 0x25, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, r6}) 08:21:48 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec\\rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 521.980445][T19851] RSP: 002b:00007f8b830daa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 521.988866][T19851] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413fb1 [ 521.996848][T19851] RDX: 00007f8b830dab0a RSI: 0000000000000002 RDI: 00007f8b830dab00 [ 522.004821][T19851] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 522.012796][T19851] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 522.020773][T19851] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 [ 522.099304][T19851] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @remote, 0x0, 0x0, 'sh\x00', 0x71}, 0x2c) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="e8"], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0x5af4c977b55a8b9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:21:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x48000, 0x0) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) 08:21:49 executing program 5 (fault-call:3 fault-nth:11): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:49 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='sec]rity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:49 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x9, &(0x7f0000000600), 0x0) [ 522.700224][T20096] kvm: emulating exchange as write [ 522.766517][T20204] FAULT_INJECTION: forcing a failure. [ 522.766517][T20204] name failslab, interval 1, probability 0, space 0, times 0 08:21:49 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) socket$rxrpc(0x21, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 522.864905][T20204] CPU: 1 PID: 20204 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 522.872859][T20204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.883022][T20204] Call Trace: [ 522.883048][T20204] dump_stack+0x197/0x210 [ 522.883073][T20204] should_fail.cold+0xa/0x15 [ 522.883094][T20204] ? fault_create_debugfs_attr+0x180/0x180 [ 522.883113][T20204] ? ___might_sleep+0x163/0x2c0 [ 522.883133][T20204] __should_failslab+0x121/0x190 [ 522.910838][T20204] should_failslab+0x9/0x14 [ 522.915331][T20204] kmem_cache_alloc+0x2aa/0x710 [ 522.920167][T20204] ? kmem_cache_alloc+0x364/0x710 [ 522.925176][T20204] security_file_alloc+0x39/0x170 [ 522.930189][T20204] __alloc_file+0xde/0x340 [ 522.934591][T20204] alloc_empty_file+0x72/0x170 [ 522.939338][T20204] path_openat+0xef/0x46d0 [ 522.943736][T20204] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 522.949521][T20204] ? kasan_slab_alloc+0xf/0x20 [ 522.954262][T20204] ? kmem_cache_alloc+0x121/0x710 [ 522.959279][T20204] ? getname_flags+0xd6/0x5b0 [ 522.963935][T20204] ? getname+0x1a/0x20 [ 522.967984][T20204] ? do_sys_open+0x2c9/0x5d0 [ 522.972556][T20204] ? __x64_sys_open+0x7e/0xc0 [ 522.977222][T20204] ? __kasan_check_read+0x11/0x20 [ 522.982414][T20204] ? mark_lock+0xc2/0x1220 [ 522.986821][T20204] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 522.992196][T20204] ? __alloc_fd+0x487/0x620 [ 522.996689][T20204] do_filp_open+0x1a1/0x280 [ 523.001174][T20204] ? may_open_dev+0x100/0x100 [ 523.005839][T20204] ? lock_downgrade+0x920/0x920 [ 523.010672][T20204] ? rwlock_bug.part.0+0x90/0x90 [ 523.015595][T20204] ? __kasan_check_read+0x11/0x20 [ 523.020601][T20204] ? do_raw_spin_unlock+0x57/0x270 [ 523.025698][T20204] ? _raw_spin_unlock+0x2d/0x50 [ 523.030530][T20204] ? __alloc_fd+0x487/0x620 [ 523.035113][T20204] do_sys_open+0x3fe/0x5d0 [ 523.039527][T20204] ? filp_open+0x80/0x80 [ 523.043757][T20204] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 523.049197][T20204] ? do_syscall_64+0x26/0x760 [ 523.053859][T20204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.059906][T20204] ? do_syscall_64+0x26/0x760 [ 523.064592][T20204] __x64_sys_open+0x7e/0xc0 [ 523.069081][T20204] do_syscall_64+0xfa/0x760 [ 523.073572][T20204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.079442][T20204] RIP: 0033:0x413fb1 [ 523.083320][T20204] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 523.102916][T20204] RSP: 002b:00007f8b830b9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 523.111306][T20204] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413fb1 [ 523.119262][T20204] RDX: 00007f8b830b9b0a RSI: 0000000000000002 RDI: 00007f8b830b9b00 [ 523.127213][T20204] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 523.135168][T20204] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 523.143122][T20204] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000003 08:21:50 executing program 4: pipe(&(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000200)=0x20008040) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newspdinfo={0x1c, 0x24, 0x435, 0x0, 0x0, 0x0, [@ipv4_hthresh={0x8}]}, 0x1c}}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xffff17a6}) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000600)) r6 = syz_open_pts(r5, 0x0) read(r6, &(0x7f0000000080)=""/11, 0xb) ioctl$TCSETSF(r6, 0x5412, &(0x7f0000000240)) 08:21:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="0fbcd35165bb0d397551195a52f2240000008e0bb313b6591865c69b0d42e33d06e7901d01402e038393c1064b794c352b5ec1271e2cefec8f3cc6c8804d415cead799b8d9a1a42cecb8c0df624587e7cbe22cd0f093a1fecf6efaec56a328b035ed3306f0f9c87a18dcccfc051849e59f3250cb76e40631441308629fb3c842c306aaf36f9f83879b7b62dc73130d342e8478209a455d1ad68873e7d2abe2e91544e5865b470ab0a53c2e0f8abeed0a814d383f5c4ca49b8d0789d60336ee29aff92e7d476089000000000000", @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:50 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='seccrity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:50 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff64000f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b70000000000000095000000000000009d357cee3be61b5862e47072932c5e465414a30756cdee907856c28d4b7765c342469804b3fcd46c8753a69306e690ceecf43e72a1effe5a204bb5"], &(0x7f0000000340)='GPL\x00'}, 0x48) 08:21:50 executing program 5 (fault-call:3 fault-nth:12): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0", 0x79, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 523.829978][T20538] FAULT_INJECTION: forcing a failure. [ 523.829978][T20538] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 523.843227][T20538] CPU: 1 PID: 20538 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 523.851122][T20538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.861181][T20538] Call Trace: [ 523.864487][T20538] dump_stack+0x197/0x210 [ 523.868838][T20538] should_fail.cold+0xa/0x15 [ 523.873435][T20538] ? __kasan_check_read+0x11/0x20 08:21:50 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secdrity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 523.878472][T20538] ? fault_create_debugfs_attr+0x180/0x180 [ 523.884286][T20538] ? is_bpf_text_address+0xac/0x170 [ 523.889489][T20538] ? find_held_lock+0x35/0x130 [ 523.894260][T20538] should_fail_alloc_page+0x50/0x60 [ 523.899464][T20538] __alloc_pages_nodemask+0x1a1/0x900 [ 523.904847][T20538] ? lock_downgrade+0x920/0x920 [ 523.909706][T20538] ? __alloc_pages_slowpath+0x2920/0x2920 [ 523.915430][T20538] ? __kasan_check_read+0x11/0x20 [ 523.920469][T20538] ? fault_create_debugfs_attr+0x180/0x180 [ 523.926287][T20538] cache_grow_begin+0x90/0xd20 [ 523.931058][T20538] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 523.936787][T20538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 523.943035][T20538] __kmalloc+0x6b2/0x770 [ 523.947284][T20538] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 523.953014][T20538] tomoyo_realpath_from_path+0xcd/0x7b0 [ 523.958567][T20538] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 523.964818][T20538] tomoyo_check_open_permission+0x2a8/0x3f0 [ 523.970728][T20538] ? tomoyo_path_number_perm+0x520/0x520 [ 523.976379][T20538] ? ___might_sleep+0x163/0x2c0 [ 523.981255][T20538] ? inode_has_perm+0x230/0x230 [ 523.986110][T20538] ? rwlock_bug.part.0+0x5c/0x90 [ 523.991061][T20538] tomoyo_file_open+0xa9/0xd0 [ 523.995755][T20538] security_file_open+0x71/0x300 [ 524.000702][T20538] do_dentry_open+0x37a/0x1380 [ 524.005470][T20538] ? __kasan_check_read+0x11/0x20 [ 524.010501][T20538] ? chown_common+0x5c0/0x5c0 [ 524.015189][T20538] ? inode_permission+0xb4/0x560 [ 524.020138][T20538] vfs_open+0xa0/0xd0 [ 524.024130][T20538] path_openat+0x10e9/0x46d0 08:21:50 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secirity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 524.028726][T20538] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 524.034533][T20538] ? kasan_slab_alloc+0xf/0x20 [ 524.039299][T20538] ? kmem_cache_alloc+0x121/0x710 [ 524.044330][T20538] ? getname_flags+0xd6/0x5b0 [ 524.049010][T20538] ? getname+0x1a/0x20 [ 524.053083][T20538] ? do_sys_open+0x2c9/0x5d0 [ 524.057692][T20538] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 524.063072][T20538] ? __alloc_fd+0x487/0x620 [ 524.067580][T20538] do_filp_open+0x1a1/0x280 [ 524.072075][T20538] ? may_open_dev+0x100/0x100 [ 524.076762][T20538] ? __kasan_check_read+0x11/0x20 [ 524.081782][T20538] ? do_raw_spin_unlock+0x57/0x270 [ 524.086895][T20538] ? _raw_spin_unlock+0x2d/0x50 [ 524.091747][T20538] ? __alloc_fd+0x487/0x620 [ 524.096269][T20538] do_sys_open+0x3fe/0x5d0 [ 524.100703][T20538] ? filp_open+0x80/0x80 [ 524.104950][T20538] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 524.111195][T20538] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 524.116664][T20538] ? do_syscall_64+0x26/0x760 [ 524.121354][T20538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.127424][T20538] ? do_syscall_64+0x26/0x760 [ 524.132110][T20538] __x64_sys_open+0x7e/0xc0 [ 524.136624][T20538] do_syscall_64+0xfa/0x760 [ 524.141134][T20538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.147030][T20538] RIP: 0033:0x413fb1 [ 524.150926][T20538] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 524.170534][T20538] RSP: 002b:00007f8b830daa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 08:21:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x81042, 0x0) bind$llc(r2, &(0x7f0000000140)={0x1a, 0x102, 0x40, 0x80, 0x2, 0x75}, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) bind$isdn_base(r2, &(0x7f0000000200)={0x22, 0x81, 0x24, 0x4, 0x40}, 0x6) 08:21:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0", 0x79, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) [ 524.178955][T20538] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413fb1 [ 524.186926][T20538] RDX: 00007f8b830dab0a RSI: 0000000000000002 RDI: 00007f8b830dab00 [ 524.186943][T20538] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 524.186951][T20538] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 524.186959][T20538] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 [ 524.261726][T20538] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:51 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) socket$rxrpc(0x21, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 08:21:51 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='seclrity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:51 executing program 5 (fault-call:3 fault-nth:13): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:51 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_buf(r0, 0x0, 0x50, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed860e6cb504000000cad7cb69050046b6e50e067f000000000000c1374611"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x20401, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f0000763007f2ff0030006c00e29507449b404d620fc9aa172172284b71d3ef16cf4fdab434a3591feb55c013498ea5562d0c2e25568091d0446cd51f44d5e9c1"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x20080, 0x0) fcntl$setlease(r3, 0x400, 0x3) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) r4 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_buf(r4, 0x0, 0x50, 0x0, &(0x7f0000000000)) 08:21:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000080)) ioctl$TIOCSETD(r3, 0x5437, 0x0) [ 524.726450][T20881] FAULT_INJECTION: forcing a failure. [ 524.726450][T20881] name failslab, interval 1, probability 0, space 0, times 0 [ 524.786114][T20881] CPU: 0 PID: 20881 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 524.794053][T20881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.804115][T20881] Call Trace: [ 524.807427][T20881] dump_stack+0x197/0x210 [ 524.811777][T20881] should_fail.cold+0xa/0x15 [ 524.816383][T20881] ? fault_create_debugfs_attr+0x180/0x180 [ 524.822206][T20881] ? ___might_sleep+0x163/0x2c0 [ 524.827073][T20881] __should_failslab+0x121/0x190 [ 524.832022][T20881] should_failslab+0x9/0x14 [ 524.836536][T20881] __kmalloc+0x2e0/0x770 [ 524.840790][T20881] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 524.846519][T20881] tomoyo_realpath_from_path+0xcd/0x7b0 [ 524.852072][T20881] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 524.858324][T20881] tomoyo_check_open_permission+0x2a8/0x3f0 [ 524.864223][T20881] ? tomoyo_path_number_perm+0x520/0x520 [ 524.869876][T20881] ? ___might_sleep+0x163/0x2c0 [ 524.874747][T20881] ? inode_has_perm+0x230/0x230 [ 524.879603][T20881] ? rwlock_bug.part.0+0x5c/0x90 [ 524.884554][T20881] tomoyo_file_open+0xa9/0xd0 [ 524.889245][T20881] security_file_open+0x71/0x300 [ 524.894189][T20881] do_dentry_open+0x37a/0x1380 [ 524.898956][T20881] ? __kasan_check_read+0x11/0x20 [ 524.903991][T20881] ? chown_common+0x5c0/0x5c0 [ 524.908683][T20881] ? inode_permission+0xb4/0x560 [ 524.913640][T20881] vfs_open+0xa0/0xd0 [ 524.917636][T20881] path_openat+0x10e9/0x46d0 [ 524.922230][T20881] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 524.928038][T20881] ? kasan_slab_alloc+0xf/0x20 [ 524.932799][T20881] ? kmem_cache_alloc+0x121/0x710 [ 524.937829][T20881] ? getname_flags+0xd6/0x5b0 [ 524.942505][T20881] ? getname+0x1a/0x20 [ 524.946574][T20881] ? do_sys_open+0x2c9/0x5d0 [ 524.951211][T20881] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 524.956592][T20881] ? __alloc_fd+0x487/0x620 [ 524.961102][T20881] do_filp_open+0x1a1/0x280 [ 524.965612][T20881] ? may_open_dev+0x100/0x100 [ 524.970308][T20881] ? __kasan_check_read+0x11/0x20 [ 524.975338][T20881] ? do_raw_spin_unlock+0x57/0x270 [ 524.980457][T20881] ? _raw_spin_unlock+0x2d/0x50 [ 524.985310][T20881] ? __alloc_fd+0x487/0x620 [ 524.989847][T20881] do_sys_open+0x3fe/0x5d0 [ 524.994271][T20881] ? filp_open+0x80/0x80 [ 524.998518][T20881] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 525.004764][T20881] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 525.010230][T20881] ? do_syscall_64+0x26/0x760 [ 525.014925][T20881] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.020990][T20881] ? do_syscall_64+0x26/0x760 [ 525.025676][T20881] __x64_sys_open+0x7e/0xc0 [ 525.030187][T20881] do_syscall_64+0xfa/0x760 08:21:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) [ 525.034710][T20881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.040605][T20881] RIP: 0033:0x413fb1 [ 525.044501][T20881] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 525.064102][T20881] RSP: 002b:00007f8b830daa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 525.072516][T20881] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413fb1 [ 525.080497][T20881] RDX: 00007f8b830dab0a RSI: 0000000000000002 RDI: 00007f8b830dab00 [ 525.088567][T20881] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 525.096540][T20881] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 525.104517][T20881] R13: 00000000004c9a62 R14: 00000000004e1758 R15: 0000000000000006 08:21:52 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secority.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYRES64=r4, @ANYRES16=r3, @ANYBLOB="fc72030400000000000000000100000025b5ce19e98489966d860865afe7cba72a87c2714b16cff3324989207a5f5edc65572f6145d70e2153613e441f2a3392960aeababe032a74d0f408149c35fe180b13b787113556b6e1d3534107f2cf3b51b22fa4309e7ec441e570fba060a074cd3bb8f8315fdad63c04ecfb645b8981"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="09000000eadef870e2ff7a63e7b1d822361b13f47352fbb63cbc8e7006de97988de3605a0be32328ae392170b69d", @ANYRES16=r3, @ANYBLOB="000000000000fcdbdf250300000014000900fe8000000000000000000000000000aa7ed058117e187b5caa9de0361ddb752d70ad46591a20a90ce9a842ef3611f0cc608cd7e238611c476dbee3b3e273c17e471372b60f462119cd49c2081c9646e73bc973ed0c1406f3b33bdc472989b46b4cf7568413301b6625d37a20733a05d3a0d3945de89ba23415cf9014db131322e55df7af03f9"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r6, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r6, 0x5437, 0x0) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4080600}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x8, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0xc080) 08:21:52 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) socket$rxrpc(0x21, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) 08:21:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:52 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secprity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:52 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) dup2(r3, r0) 08:21:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000600)='/dev/sg#\x00', 0x0, 0x2) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x7600, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x7c, 0x0, 0x8, 0x70bd2b, 0x0, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x240008d1}, 0x20000000) [ 526.679698][T20881] ERROR: Out of memory at tomoyo_realpath_from_path. 08:21:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_GET_CAPABILITIES(r4, 0x8004551a, &(0x7f0000000080)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) 08:21:53 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secsrity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:53 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) socket$rxrpc(0x21, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 526.773348][ T26] audit: type=1400 audit(1573374113.537:68): avc: denied { map } for pid=21531 comm="syz-executor.0" path="/dev/sg0" dev="devtmpfs" ino=17715 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 08:21:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) fallocate(r0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 08:21:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) [ 526.986632][T21550] erofs: (device loop5): erofs_read_superblock: cannot find valid erofs superblock 08:21:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffd53, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYRES16=r2], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:54 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secxrity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:54 executing program 0: eventfd2(0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000001900)={0x0, 0x70, 0x6, 0x3, 0x8, 0x0, 0x0, 0x8, 0x808, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x5}, 0x0, 0x5, 0x0, 0x6, 0x7}, 0xffffffffffffffff, 0x0, r1, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/hwrng\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) r3 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, 0x0, 0x0) pipe2(&(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81800) getsockname$packet(r5, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x20}, 0x20}}, 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) recvmsg(r3, &(0x7f0000000540)={&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000340), 0x0, &(0x7f00000008c0)=""/4096, 0x1000}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000005c0)='fou\x00') fadvise64(r3, 0x7, 0x1, 0x0) sendmsg$FOU_CMD_GET(r7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xcceef388f7fbeacb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000880)=[{&(0x7f00000006c0)=""/64}, {&(0x7f0000000700)=""/126}, {&(0x7f0000000780)=""/89}, {&(0x7f0000000800)=""/109}], 0x381) dup2(r9, r0) tkill(r6, 0x1000000000016) 08:21:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) 08:21:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='\nrofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:54 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secu%ity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:54 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000040)={'syz0'}, 0x4) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 08:21:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0x7fff, 0x4) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) 08:21:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) 08:21:54 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) socket$rxrpc(0x21, 0x2, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 08:21:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='%rofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x489, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00q', @ANYRES16=r2, @ANYBLOB="000000000000fcdbdf250300000014000900fe8000000000000000000000000000aa"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) 08:21:55 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secu=ity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='\\rofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:55 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @initdev, 0x0, 0x0, 'none\x00'}, 0x2c) 08:21:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sched_setparam(0x0, &(0x7f0000000100)) 08:21:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='e\nofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:55 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secu\\ity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x9cd935c1e09f5336, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f00000004c0)=""/102400, &(0x7f0000000080)=0x19086) finit_module(r0, &(0x7f0000000140)='vmnet0*#.[\x00', 0x2) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x824c8bbc7a36dfa8, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="0030eb5296ed0000000000fcdbdf250300000014000900fe80000000000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x0, 0x2000) io_setup(0x20, &(0x7f0000000080)=0x0) io_destroy(r5) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$USBDEVFS_RELEASE_PORT(r7, 0x80045519, &(0x7f0000000200)=0xfffffffd) 08:21:55 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd6000000000143300fe8000000000000000000000000000aafe8000000000000000000000000000aa00008100", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='\x00\t\x00\x00\x00\x00\x00\x00'], 0x0) 08:21:56 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) socket$rxrpc(0x21, 0x2, 0x0) 08:21:56 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secu]ity.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sched_setparam(0x0, &(0x7f0000000100)) 08:21:56 executing program 0: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000680)=@v3={0x3000000, [{0x1}, {0x4, 0x1ff}]}, 0x18, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = getegid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000440)='IPVS\x00') pipe(0x0) 08:21:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='e%ofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x12, 0x2f, 0x4, 0x1d, 0x7, 0x1000, 0x6, 0x5c, 0xffffffffffffffff}}) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) 08:21:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getpid() r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xff00) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x22003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}}}, &(0x7f0000000040)=0x3a) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 08:21:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='e\\ofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:56 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secur%ty.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sched_setparam(0x0, &(0x7f0000000100)) 08:21:56 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000100000018"], 0x0) inotify_init1(0x0) unshare(0x20600) pselect6(0x40, &(0x7f0000000280), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000000), 0x0) 08:21:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='er\nfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:57 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x4) 08:21:57 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='secur\\ty.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='er%fs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='dctcp\x00', 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) 08:21:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='er\\fs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:57 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='securi%y.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='dctcp\x00', 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) 08:21:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='ero\ns\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:58 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 08:21:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:58 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='securi\\y.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='dctcp\x00', 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) 08:21:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='ero%s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-ssse3\x00'}, 0x58) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="0ad7a0fd", @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:58 executing program 0: r0 = socket(0x1e, 0x4, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000140)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f003f0000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) 08:21:58 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='securi]y.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='ero.s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:58 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f00000002c0)={0x3, 0x0, [{}, {}, {}]}) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000100)={0x4}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) 08:21:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:59 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:21:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='ero/s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:59 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='securisy.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x400, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x2, 0x2, 0xffff, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:21:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='ero\\s\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:21:59 executing program 0: 08:21:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:21:59 executing program 0: 08:21:59 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='securit%.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:21:59 executing program 0: 08:21:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) getsockname$unix(r1, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) clone3(&(0x7f00000004c0)={0x48400, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200), 0xb, 0x0, &(0x7f0000000380)=""/22, 0x16, &(0x7f00000003c0)=""/137}, 0x40) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) 08:22:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:00 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) 08:22:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof\n\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:00 executing program 0: 08:22:00 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='securit\\.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:00 executing program 0: 08:22:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000080)={0x2}) r4 = semget$private(0x0, 0x3, 0x500) semtimedop(r4, &(0x7f0000000140)=[{0x5, 0x8, 0x1000}, {0x4, 0xf4, 0x1800}], 0x2, &(0x7f0000000200)) r5 = semget$private(0x0, 0x8, 0x0) semtimedop(r5, &(0x7f0000000080)=[{}], 0x1, 0x0) semctl$SETALL(r5, 0x0, 0x10, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) fstat(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, 0x0) lstat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r9, 0x400454ce, r10) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000600)={{0xf1ac, r6, r7, r8, r10, 0xc, 0x5}, 0x3, 0x100000001, 0xfffffffffffffffc}) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r11 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="fc72030400000200000000000100a453"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="00000000e98000000000000000000000000000aa818c6fd6696cbe3e0700000000000000bbace1b5c8a9e7d9f5ef7efe431d78334eebe36ed993b392040034ed2499099610ac0d0781f1f130ad4644d74f7b9e9deb989aea3094806a00000000000000066454969b379f4b6900"/123], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r12, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r12, 0x5437, 0x0) 08:22:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof#\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:00 executing program 0: 08:22:00 executing program 0: 08:22:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc724304000010000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:22:01 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) 08:22:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof%\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:01 executing program 0: 08:22:01 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='securit].capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="280080f2", @ANYRES16=r2, @ANYBLOB="000000000000fcdbdf250300000014000900fe8000000000000000000000000000aa"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:22:01 executing program 0: 08:22:01 executing program 0: 08:22:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof*\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:01 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='securite.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:01 executing program 0: 08:22:02 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) 08:22:02 executing program 0: 08:22:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof+\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) getgid() openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:22:02 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security\acapability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:02 executing program 0: 08:22:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof-\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:02 executing program 0: 08:22:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x10, 0x800) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r3, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r4, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) 08:22:02 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security%capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:03 executing program 0: 08:22:03 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:03 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security/capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x31c, 0x0, 0x0, 0x0, 0xfff9, &(0x7f0000000080), 0x5, 0x200, 0x6}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof/\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:03 executing program 0: 08:22:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:03 executing program 0: 08:22:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r2) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCMIWAIT(r5, 0x545c, 0x0) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGICOUNT(r6, 0x545d, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r7, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r8 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[]}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r9, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r9, 0x5437, 0x0) 08:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:03 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security;capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:03 executing program 0: 08:22:04 executing program 0: 08:22:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:04 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofX\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:04 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security\\capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:04 executing program 0: 08:22:04 executing program 0: 08:22:04 executing program 3: r0 = gettid() tkill(r0, 0x401004000000016) perf_event_open(&(0x7f0000000180)={0x0, 0xffffffffffffff05, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x100000000, 0x0, 0x7}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) socket$pptp(0x18, 0x1, 0x2) 08:22:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erof\\\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:04 executing program 0: 08:22:04 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.%apability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:04 executing program 0: 08:22:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofc\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:05 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:05 executing program 0: 08:22:05 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.\\apability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:05 executing program 0: 08:22:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="5ccff9e56aba24008000", @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000000000000fcdbdf25f4ffffff130009007d8000000000000000000020000000aa"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x10002, 0x0) ioctl$RTC_PLL_GET(r5, 0x80207011, &(0x7f0000000340)) r6 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r6, 0x110, 0x5, &(0x7f0000000080)=[0x2], 0x2) 08:22:07 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofd\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:07 executing program 0: 08:22:07 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.]apability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:07 executing program 0: 08:22:08 executing program 0: 08:22:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofi\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:08 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.c%pability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqsrc(r1, 0x0, 0x570e2a54365a9d9b, &(0x7f0000000140)={@multicast2, @rand_addr, @empty}, &(0x7f0000000200)=0xc) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$SO_J1939_FILTER(r5, 0x6b, 0x1, &(0x7f0000000380)=[{0x3, 0x0, {0x2, 0x6cc6d04f9e93c376}, {0x0, 0xf0, 0x5}, 0x0, 0xfe}, {0x3, 0x2, {0x0, 0x0, 0x1}, {0x1, 0xff}, 0xfe}, {0x1, 0x3, {0x2, 0x1, 0x3}, {0xe00d4de00a54f5ec, 0xff, 0x1}, 0xfe}, {0x3, 0x1, {0xbd3df52b7f97096b, 0x1}, {0x2, 0xff, 0x3}, 0x7c}, {0x2, 0x0, {0x1, 0x0, 0x2}, {0x3, 0xf0}, 0x2, 0xf8da19d10990a0d1}, {0x3, 0x1, {0x3}, {0x4}, 0x1, 0x2}, {0x3, 0x1, {0x3, 0x1, 0x3}, {0x0, 0xf0, 0xd2ef12fcc23829e8}, 0x3}, {0x3, 0x0, {0x1, 0x7f, 0x4}, {0x2, 0xff, 0x52b7b4590d6b52ab}, 0x1, 0xfe}], 0x100) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000072a4b69c1fbb0c00"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800e90b", @ANYRES16=r3, @ANYBLOB="000000000000fcdbdf250300000014000900fe8000000000000000000000000000aa"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r6, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r6, 0x5437, 0x0) 08:22:08 executing program 0: 08:22:08 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofl\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:08 executing program 0: 08:22:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:08 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.c\\pability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) shutdown(r0, 0x400000000000001) 08:22:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofo\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f0000000080)={0x0, 0x125, 0x0, 0xfffffd77}, 0xcfc375273e10681d) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:22:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:09 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.ca%ability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:09 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x840000000002, 0x3, 0x6) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) accept(r3, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000400)={'icmp6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$r\x00'}, &(0x7f0000000500)=0x3a9) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r7, 0x402, 0x800010000000003d) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r8, r7) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') bind$inet(r4, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) dup3(r4, r6, 0x0) 08:22:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofp\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 542.761683][ T26] audit: type=1400 audit(1573374129.577:69): avc: denied { watch watch_reads } for pid=27014 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir permissive=1 08:22:09 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofu\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:09 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.ca=ability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc00"/16], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) clone3(&(0x7f00000004c0)={0x20001000, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x0, &(0x7f0000000380)=""/125, 0x7d, &(0x7f0000000400)=""/125}, 0x40) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:22:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofx\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:10 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.ca\\ability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x02', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept4$rose(r2, &(0x7f0000000440)=@full={0xb, @dev, @bcast, 0x0, [@netrom, @rose, @remote, @default, @remote, @default]}, &(0x7f0000000140)=0xffffffdf, 0x81800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstat(r2, &(0x7f0000000380)) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r7, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r8 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="00000100", @ANYRES16=r8, @ANYBLOB='\x00'/11], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r8, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r9, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r9, 0x5437, 0x0) 08:22:10 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x840000000002, 0x3, 0x6) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) accept(r3, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000400)={'icmp6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$r\x00'}, &(0x7f0000000500)=0x3a9) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r7, 0x402, 0x800010000000003d) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r8, r7) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') bind$inet(r4, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) dup3(r4, r6, 0x0) 08:22:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:11 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x03', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:11 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.ca]ability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYRES16=0x0], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) 08:22:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x04', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:11 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:11 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x840000000002, 0x3, 0x6) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) accept(r3, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000400)={'icmp6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$r\x00'}, &(0x7f0000000500)=0x3a9) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r7, 0x402, 0x800010000000003d) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r8, r7) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') bind$inet(r4, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) dup3(r4, r6, 0x0) 08:22:11 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.cap%bility\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x05', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="24805e00", @ANYRES64=r0, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x40000) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000000000000fcdbdfab3500000000000000000000000008000000000000000000aa"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) 08:22:11 executing program 1: getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x06', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x12802, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000380)={{0x2, 0x0, @reserved="991fd6ab78048d723eadce1b64d81d57edca729029f442c923fe3d7e5db72af6"}, 0x51, [], "75171b74e8133e5d318683e107ed4f5f75b5fcd74f6621377241f0939eed5e2901e79135575e1f269b3e5e0f91d20d4c91a1f8e75715ec9531a9c6ad95744c411fd3a5d4faa548a94793545893c0d483fd"}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r5, 0x7706, &(0x7f0000000140)) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYRES32=r5], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x80000000000b8c81, 0x0) write(r6, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r6, 0x5437, 0x0) 08:22:12 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.cap\\bility\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:12 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x840000000002, 0x3, 0x6) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) accept(r3, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000400)={'icmp6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$r\x00'}, &(0x7f0000000500)=0x3a9) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r7, 0x402, 0x800010000000003d) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r8, r7) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') bind$inet(r4, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) dup3(r4, r6, 0x0) 08:22:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\a', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) preadv(r4, &(0x7f0000000580)=[{&(0x7f0000000380)=""/232, 0xe8}, {&(0x7f0000000080)=""/23, 0x17}, {&(0x7f0000000140)=""/33, 0x21}, {&(0x7f00000004c0)=""/183, 0xb7}, {&(0x7f0000000200)=""/39, 0x27}], 0x5, 0x7) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r5, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r5, 0x5437, 0x0) 08:22:12 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="383ff3b9d50d317495d66c15c4e2b2fc2c91ada0b86e3804e18d8915a6e856cb447c555ba0ab28000000e9f8235d06963908a8941ca40b74239ce12a48aca09f9b14d51f8525f06405c4d3f418decf4d64a7b3e886fdb1ef7ac96970855ce3f044bf02954961b7d2fcbbf3a8b7e0e4fa0c087e2857cdb689d83978153c2e5c936a5b0500000000000000e5ff75cb8d57c81d04f8da8370fdd1aa101d09aa2065451ab15aa81be7c70fc55ad1c6e0d413b81383d393c10400000000000000000c64ee4b25ac48580400ff7f000020430d613f9d95740f0e59f651b5b29e4a7aaa33edb0f9e567afeac8d1f272cdbb72b2a9591400dbcbe90fe38ee5d1f4eb256b7725a59d8dd0bd725903828bfb1a239c94d40d8429405acb3612ca404a5239ec3e83ab0bfaa6395794c80b5e77f87d5e52b7f545cd0ab019000000000000000046540537d9b15175df1cc0e327dc8a0405520ca5db1754c5559e8aa43a29cac9a2a8a3191fab05f44b233de4db47065bd0c56886b1bb9aac098ba79bcfaa4a497c2179b2e97ac9253cb9f2689b53d3a4971e3e74f6794280c179a304efc4258b68fda2f678142e059bbdb979b4a92f8b9c3071430fea2d06edab25"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capa%ility\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\b', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:13 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:13 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capa=ility\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\t', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r1, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="fc720304000000000000000001000000"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r2, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r3, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r3, 0x5437, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) 08:22:13 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:13 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) 08:22:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\n', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:13 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capa\\ility\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:13 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x4) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000", 0x7c, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 08:22:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000", 0x7c, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r2}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) 08:22:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\v', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000000)=0x5, 0x4) getsockopt$inet6_buf(r1, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) fcntl$setlease(r1, 0x400, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) 08:22:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:14 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capab%lity\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000040)=0x9ef0, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) 08:22:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x10', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) 08:22:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:15 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capab\\lity\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 08:22:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x4bc4b3d923cae351, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000380)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000200), 0x2) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x7c, &(0x7f0000000080)=""/34, &(0x7f0000000140)=0x22) sendmsg$inet6(r3, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a519fa1590091924685cf1d9a464ada1221574ca8782ac9cd202855fa5887e1d24dd339eb4eeb28088547c22ddec83475bc4d49a638a7461fd99ab953d49c36226162bbf77cf1902636fc6d1f380245f4d", @ANYRES16=r4, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r6, 0x7706, &(0x7f0000000500)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r4, 0x0, 0x0, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r7, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r7, 0x5437, 0x0) r8 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f0000000040)={r11, 0x0, 0x0, 0x8}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000440)={0x1, 0x10000, 0x7de, 0x9, r11}, &(0x7f00000004c0)=0x10) 08:22:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:22:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x80000000, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, {}, r4}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x7, 0x4) sched_setparam(0x0, &(0x7f0000000100)) [ 548.589027][T29141] ================================================================== [ 548.597439][T29141] BUG: KASAN: use-after-free in __list_add_valid+0x9a/0xa0 [ 548.604642][T29141] Read of size 8 at addr ffff8880a47861e0 by task syz-executor.0/29141 [ 548.612875][T29141] [ 548.615213][T29141] CPU: 0 PID: 29141 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 548.623098][T29141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.633152][T29141] Call Trace: [ 548.636450][T29141] dump_stack+0x197/0x210 [ 548.640790][T29141] ? __list_add_valid+0x9a/0xa0 [ 548.645649][T29141] print_address_description.constprop.0.cold+0xd4/0x30b [ 548.652669][T29141] ? __list_add_valid+0x9a/0xa0 [ 548.657526][T29141] ? __list_add_valid+0x9a/0xa0 [ 548.662379][T29141] __kasan_report.cold+0x1b/0x41 [ 548.667325][T29141] ? _raw_read_unlock_irqrestore+0xd0/0xe0 [ 548.673165][T29141] ? __list_add_valid+0x9a/0xa0 [ 548.678025][T29141] kasan_report+0x12/0x20 [ 548.682359][T29141] __asan_report_load8_noabort+0x14/0x20 [ 548.687995][T29141] __list_add_valid+0x9a/0xa0 [ 548.692752][T29141] rdma_listen+0x6b7/0x970 [ 548.697184][T29141] ? _raw_spin_unlock+0x2d/0x50 [ 548.702627][T29141] ucma_listen+0x14d/0x1c0 [ 548.707049][T29141] ? ucma_notify+0x190/0x190 [ 548.711739][T29141] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 548.717984][T29141] ? _copy_from_user+0x12c/0x1a0 [ 548.722934][T29141] ucma_write+0x2d7/0x3c0 [ 548.727262][T29141] ? ucma_notify+0x190/0x190 [ 548.731851][T29141] ? ucma_open+0x290/0x290 [ 548.736281][T29141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.742524][T29141] ? security_file_permission+0x8f/0x380 [ 548.748163][T29141] __vfs_write+0x8a/0x110 [ 548.752505][T29141] ? ucma_open+0x290/0x290 [ 548.756924][T29141] vfs_write+0x268/0x5d0 [ 548.761174][T29141] ksys_write+0x220/0x290 [ 548.765506][T29141] ? __ia32_sys_read+0xb0/0xb0 [ 548.770272][T29141] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 548.775844][T29141] ? do_syscall_64+0x26/0x760 [ 548.780522][T29141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.786591][T29141] ? do_syscall_64+0x26/0x760 [ 548.791273][T29141] __x64_sys_write+0x73/0xb0 [ 548.795854][T29141] do_syscall_64+0xfa/0x760 [ 548.795888][T29141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.795899][T29141] RIP: 0033:0x45a219 [ 548.795913][T29141] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.795921][T29141] RSP: 002b:00007f11cdb78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 548.795934][T29141] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 548.795946][T29141] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000006 [ 548.854102][T29141] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 548.862080][T29141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f11cdb796d4 [ 548.870055][T29141] R13: 00000000004ca93f R14: 00000000004e2ce8 R15: 00000000ffffffff [ 548.878040][T29141] [ 548.880365][T29141] Allocated by task 29137: [ 548.884795][T29141] save_stack+0x23/0x90 [ 548.888957][T29141] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 548.894593][T29141] kasan_kmalloc+0x9/0x10 [ 548.899031][T29141] kmem_cache_alloc_trace+0x158/0x790 [ 548.904407][T29141] __rdma_create_id+0x5f/0x4e0 [ 548.909173][T29141] ucma_create_id+0x1de/0x620 [ 548.913850][T29141] ucma_write+0x2d7/0x3c0 [ 548.918285][T29141] __vfs_write+0x8a/0x110 [ 548.922613][T29141] vfs_write+0x268/0x5d0 [ 548.926865][T29141] ksys_write+0x220/0x290 [ 548.931193][T29141] __x64_sys_write+0x73/0xb0 [ 548.935791][T29141] do_syscall_64+0xfa/0x760 [ 548.940296][T29141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.946176][T29141] [ 548.948494][T29141] Freed by task 29132: [ 548.952555][T29141] save_stack+0x23/0x90 [ 548.956708][T29141] __kasan_slab_free+0x102/0x150 [ 548.961646][T29141] kasan_slab_free+0xe/0x10 [ 548.966149][T29141] kfree+0x10a/0x2c0 [ 548.970073][T29141] rdma_destroy_id+0x719/0xaa0 [ 548.974840][T29141] ucma_close+0x115/0x310 [ 548.979172][T29141] __fput+0x2ff/0x890 [ 548.983157][T29141] ____fput+0x16/0x20 08:22:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofsH', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x40000, 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000004c0)={[], 0x5, 0x8, 0x28, 0x0, 0x80, 0x4000, 0xf000, [], 0xffff}) connect$inet6(r0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000100)) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) sendmsg$inet6(r2, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4a4ab06223a0ef46) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="fc720304000000000000000001000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0xfffffffffffffeb8, r3, 0x0, 0x20000, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x26c, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) write(r4, &(0x7f0000000040)="e0", 0xfffffe00) ioctl$TIOCSETD(r4, 0x5437, 0x0) [ 548.987248][T29141] task_work_run+0x145/0x1c0 [ 548.991840][T29141] exit_to_usermode_loop+0x316/0x380 [ 548.997136][T29141] do_syscall_64+0x65f/0x760 [ 549.001720][T29141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.001725][T29141] [ 549.001735][T29141] The buggy address belongs to the object at ffff8880a4786000 [ 549.001735][T29141] which belongs to the cache kmalloc-2k of size 2048 [ 549.001751][T29141] The buggy address is located 480 bytes inside of [ 549.001751][T29141] 2048-byte region [ffff8880a4786000, ffff8880a4786800) [ 549.037324][T29141] The buggy address belongs to the page: [ 549.042966][T29141] page:ffffea000291e180 refcount:1 mapcount:0 mapping:ffff8880aa400e00 index:0x0 [ 549.052079][T29141] flags: 0x1fffc0000000200(slab) [ 549.057029][T29141] raw: 01fffc0000000200 ffffea0001589d48 ffffea00024eda88 ffff8880aa400e00 [ 549.065619][T29141] raw: 0000000000000000 ffff8880a4786000 0000000100000001 0000000000000000 [ 549.074197][T29141] page dumped because: kasan: bad access detected [ 549.080702][T29141] [ 549.083023][T29141] Memory state around the buggy address: [ 549.088652][T29141] ffff8880a4786080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 549.096710][T29141] ffff8880a4786100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 549.104775][T29141] >ffff8880a4786180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 549.112832][T29141] ^ [ 549.120028][T29141] ffff8880a4786200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 549.128102][T29141] ffff8880a4786280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 549.136159][T29141] ================================================================== [ 549.144391][T29141] Disabling lock debugging due to kernel taint 08:22:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f00000000c0)='erofsL', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:22:16 executing program 2: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x1) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x59d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffe}}, 0x0, 0x0, 0x0, 0x80000000000000, 0x4e95be9ae3034b6f}, 0x0) fcntl$getown(r0, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) ioctl$int_in(0xffffffffffffffff, 0x80000000005016, 0x0) dup2(r0, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capabi#ity\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) [ 549.295725][T29141] Kernel panic - not syncing: panic_on_warn set ... [ 549.302372][T29141] CPU: 0 PID: 29141 Comm: syz-executor.0 Tainted: G B 5.4.0-rc6+ #0 [ 549.311752][T29141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.318708][ T3900] kobject: 'loop2' (00000000897d8caa): kobject_uevent_env [ 549.321815][T29141] Call Trace: [ 549.332183][T29141] dump_stack+0x197/0x210 [ 549.336521][T29141] panic+0x2e3/0x75c [ 549.340409][T29141] ? add_taint.cold+0x16/0x16 [ 549.345088][T29141] ? __list_add_valid+0x9a/0xa0 [ 549.349939][T29141] ? preempt_schedule+0x4b/0x60 [ 549.354791][T29141] ? ___preempt_schedule+0x16/0x20 [ 549.359928][T29141] ? trace_hardirqs_on+0x5e/0x240 [ 549.360105][ T3900] kobject: 'loop2' (00000000897d8caa): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 549.364945][T29141] ? __list_add_valid+0x9a/0xa0 [ 549.364959][T29141] end_report+0x47/0x4f [ 549.364971][T29141] ? __list_add_valid+0x9a/0xa0 [ 549.364982][T29141] __kasan_report.cold+0xe/0x41 08:22:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec6}}], 0x4000000000003be, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000240)=0xb2, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 549.364998][T29141] ? _raw_read_unlock_irqrestore+0xd0/0xe0 [ 549.365015][T29141] ? __list_add_valid+0x9a/0xa0 [ 549.404404][T29141] kasan_report+0x12/0x20 [ 549.408738][T29141] __asan_report_load8_noabort+0x14/0x20 [ 549.414487][T29141] __list_add_valid+0x9a/0xa0 [ 549.417122][ T3900] kobject: 'loop1' (000000000e99e731): kobject_uevent_env [ 549.419163][T29141] rdma_listen+0x6b7/0x970 [ 549.419180][T29141] ? _raw_spin_unlock+0x2d/0x50 [ 549.419193][T29141] ucma_listen+0x14d/0x1c0 [ 549.419209][T29141] ? ucma_notify+0x190/0x190 [ 549.444519][T29141] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 549.446866][ T3900] kobject: 'loop1' (000000000e99e731): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 549.450756][T29141] ? _copy_from_user+0x12c/0x1a0 [ 549.450772][T29141] ucma_write+0x2d7/0x3c0 [ 549.450785][T29141] ? ucma_notify+0x190/0x190 [ 549.450799][T29141] ? ucma_open+0x290/0x290 [ 549.479134][T29141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.485488][T29141] ? security_file_permission+0x8f/0x380 [ 549.491230][T29141] __vfs_write+0x8a/0x110 [ 549.495566][T29141] ? ucma_open+0x290/0x290 [ 549.499985][T29141] vfs_write+0x268/0x5d0 [ 549.504227][T29141] ksys_write+0x220/0x290 [ 549.508608][T29141] ? __ia32_sys_read+0xb0/0xb0 [ 549.513375][T29141] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 549.518835][T29141] ? do_syscall_64+0x26/0x760 [ 549.523506][T29141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.529567][T29141] ? do_syscall_64+0x26/0x760 [ 549.534242][T29141] __x64_sys_write+0x73/0xb0 [ 549.538830][T29141] do_syscall_64+0xfa/0x760 [ 549.543338][T29141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.549227][T29141] RIP: 0033:0x45a219 [ 549.550189][T29574] kobject: 'loop5' (00000000b2438261): kobject_uevent_env [ 549.553117][T29141] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.553125][T29141] RSP: 002b:00007f11cdb78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 549.553138][T29141] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 549.553146][T29141] RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000006 [ 549.553153][T29141] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 549.553160][T29141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f11cdb796d4 [ 549.553167][T29141] R13: 00000000004ca93f R14: 00000000004e2ce8 R15: 00000000ffffffff [ 549.554687][T29141] Kernel Offset: disabled [ 549.633853][T29141] Rebooting in 86400 seconds..