, 0x4, 0x42a, 0x7f, 0x40, 0x401, 0x89, 0x5, 0x9, 0x800, 0x9, 0xffffffff, 0x3, 0x401, 0x5206318b, 0x4, 0x3, 0x1, 0x3, 0x3, 0x2, 0xffffffffffffffff, 0x3ff, 0x80, 0xfffffffffffff1bd, 0x3d, 0x7, 0x8, 0x3, 0x4, 0x5, 0x100, 0x3f, 0x2a, 0x3, 0x6, 0x3, 0x1, 0x2, 0x0, 0x7, 0x8, 0x100, 0x101, 0x10001, 0xcb7c, 0x20, 0xffffffff, 0x7, 0xff, 0x1, 0x9936, 0x2, 0xfff, 0x29, 0x5, 0x5, 0x3c, 0x3, 0x5, 0xadce, 0x1f, 0x40, 0x1ff, 0xf8, 0x7fffffff, 0x17b, 0x9, 0xf9, 0x3d, 0x9c01, 0x8, 0x200, 0x5, 0x1b, 0x7, 0x0, 0x1, 0x158e, 0x0, 0x10001, 0x6, 0x6, 0x2, 0xffffffffffffff01, 0x8, 0xffffffff, 0x3, 0x0, 0xffff, 0x0, 0x249b, 0x6, 0x20, 0x9, 0x5, 0x5, 0x7, 0xfff, 0xf24, 0x7, 0x5], {0x77359400}}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x400000000000071, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x47) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x9}, 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000000180)={'lapb0\x00', {0x2, 0x4e22, @rand_addr=0x7}}) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) 07:16:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0xfffffdfd}) 07:16:02 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc8c30000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:02 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x10000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0xffffffe7}) 07:16:02 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 07:16:02 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x40010001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x325, 0x200, 0xffffffff, 0x9, 0x58}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000180)={r3, 0x8}, 0x8) socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup3(r1, r4, 0x0) close(r4) 07:16:02 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xcf730000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:02 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x10000120, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0xffffffff}) 07:16:02 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd0a70000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:02 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000440)='\x00', 0x2) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x3) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdea) close(r1) memfd_create(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/150}, {&(0x7f0000000400)=""/7}, {&(0x7f0000000180)=""/65}, {&(0x7f0000000440)=""/135}, {&(0x7f0000000300)=""/65}], 0x70b, 0xffffffffffffffe1) 07:16:02 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r3 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r3, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r4 = syz_open_dev$char_usb(0xc, 0xb4, 0x1) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$TIOCSISO7816(r5, 0xc0285443, &(0x7f0000000080)={0x1, 0x200, 0x8, 0x9d3, 0x80}) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r6, &(0x7f00000017c0), 0x33d, 0x47) 07:16:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500"}) 07:16:03 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x107b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x2}) 07:16:03 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd7570000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)=0x13000) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:03 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x11000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) r6 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r6, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r6, &(0x7f0000000940)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10100000}, 0xc, &(0x7f0000000900)={&(0x7f0000000640)={0x2bc, r7, 0x403, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe65}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x35}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffff00}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x5, @ipv4={[], [], @remote}, 0xaf}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x81, @loopback, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd4f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8f}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}]}, @TIPC_NLA_LINK={0xc8, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x54}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe0a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x50}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x85e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x2bc}, 0x1, 0x0, 0x0, 0x4040810}, 0x80) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xac, r7, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xda}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20000000}, 0xe5551e0fe63faff6) 07:16:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x3}) 07:16:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x10000) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x800) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) 07:16:03 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x12000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 563.633081][ C1] net_ratelimit: 26 callbacks suppressed [ 563.633089][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:16:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x4}) 07:16:03 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd8040000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4400, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) r12 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x400400, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r12, 0x29, 0x1, &(0x7f0000000280), 0x4) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r11, 0x9}, 0x8) renameat(r6, &(0x7f00000000c0)='./file0\x00', r7, &(0x7f0000000200)='./file0\x00') dup3(r4, r5, 0x0) fstat(r4, &(0x7f0000000180)) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:04 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xec, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000000c0)={0x6, 0xffffffff, {0x55, 0x3, 0x5, {0x8, 0x8}, {0x8, 0x5}, @const={0x40, {0xfde5, 0x401, 0xfffb, 0x400}}}, {0xf5, 0x0, 0xfff, {0x1ff, 0x2817}, {0x2, 0x800}, @period={0x6, 0x37, 0x40, 0x2, 0x4, {0x9, 0x3, 0x7, 0x47}, 0x7, &(0x7f0000000080)=[0x8000, 0x3, 0x101, 0x0, 0xff, 0xfff, 0x84f4]}}}) 07:16:04 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x172b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:04 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2440, 0x0) preadv(r0, &(0x7f00000017c0), 0x3a7, 0x47) 07:16:04 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd88b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x5}) 07:16:04 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r1, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x6}) 07:16:04 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x4, 0x400000) connect$unix(r4, &(0x7f0000000300)=@abs={0x1300e2695566d705, 0x0, 0x4e23}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) futex(&(0x7f00000000c0), 0x8, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)=0x2, 0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000080)) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:04 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xdf3b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 564.542149][ C0] IPv4: Oversized IP packet from 127.0.0.1 07:16:04 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x17de0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x7}) [ 564.704151][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 564.710033][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 564.715893][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 564.721659][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 564.727490][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 564.733236][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 564.954162][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 564.959993][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:05 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@ng={0x4, 0x1, "e0"}, 0x3, 0x3) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x8}) 07:16:05 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xdfee0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:05 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x185f0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x9}) 07:16:05 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:05 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe06f0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f00000000c0)=0x25) 07:16:05 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1f0f0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xa}) 07:16:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:06 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = gettid() r3 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}], 0x70}], 0xfd, 0x0) r4 = syz_open_procfs(r2, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) 07:16:06 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe0ffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xb}) 07:16:06 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0, 0x0, 0x0, 0x2d0}}], 0x1, 0x0, 0x0) unshare(0x5f30ab8c635fff49) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:06 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1fc20000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xc}) 07:16:06 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000080), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:06 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe71f0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:06 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0xe2518730349628f0, 0x4, 0x1}, 0x1}}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x47) 07:16:06 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x20010010, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xd}) 07:16:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:07 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'\x00', 0x6}) 07:16:07 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe7d20000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xe}) 07:16:07 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:07 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x20430000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:07 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) signalfd4(r2, &(0x7f0000000080)={0xff}, 0x8, 0x800) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x10}) 07:16:07 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe8030000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:07 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffff67, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x400201, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') write$P9_RLERROR(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="170000000701000e006e65010069705f6d725f76696600"], 0x17) preadv(r1, &(0x7f00000017c0), 0x33d, 0x47) 07:16:07 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x20f60000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x11}) 07:16:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') clone3(&(0x7f0000000240)={0x8016800, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0, 0x3e, 0x0, &(0x7f0000000140)=""/233, 0xe9, &(0x7f0000000300)=""/161}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000040)='net/ip_mr_vif\x00', 0xe, 0x2) 07:16:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x12}) 07:16:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r0, &(0x7f0000001640)=""/135, 0x87, 0x2002, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000080)=""/161) preadv(r1, &(0x7f0000001580)=[{&(0x7f0000000140)=""/40, 0x28}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/1, 0x1}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000001300)=""/214, 0xd6}, {&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000001400)=""/191, 0xbf}, {&(0x7f00000014c0)=""/145, 0x91}, {&(0x7f0000000240)=""/11, 0xb}], 0x9, 0x47) 07:16:08 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe8530000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:08 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x25000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x25}) 07:16:08 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) 07:16:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:08 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xef030000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:08 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x27a60000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x5c}) 07:16:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:08 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0x4}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x2a, 0x0}}], 0x1, 0x0, 0x0) r0 = getpid() r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = gettid() r4 = gettid() sendmmsg$unix(r2, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}], 0x70}], 0xfd, 0x0) ioprio_get$pid(0x1, r4) r5 = syz_open_procfs(r0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x47) 07:16:08 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xefb60000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xe7}) 07:16:08 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x28270000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x300}) 07:16:09 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf0370000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\xa3\xc5\x15&.\xf3\x92I\xaeh<\xff\x05\x00\x00\x00\x00\x00\x00\x00\xee}\x89\x9b\x15-\xe4\x14\xc9\xea\x8c\x8eZi>N9\xe5Z [x\x82/\xed\xefZ\xd2\xf0\x02\xf5E\x98_\r\xc4\x94.\x8eD\xb3\x8f{E\xa9\x00\x00\xfb\xd2\xae\xbf\x9a\xc6h\xb5+\xcc\xce') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f00000000c0)={0x0, 0x101}, 0x8) r6 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$UI_GET_VERSION(r6, 0x8004552d, &(0x7f0000000080)) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) [ 568.864131][ C1] net_ratelimit: 16 callbacks suppressed [ 568.864138][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 568.875682][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 568.881484][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 568.887274][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 568.893068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 568.898849][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:09 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000280)=0xc) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r7, r9) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x683aa6222c7a6718, &(0x7f0000000500)={[], [{@measure='measure'}, {@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@subj_role={'subj_role'}}, {@seclabel='seclabel'}]}) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r10 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x3, 0xc81) setsockopt$bt_BT_CHANNEL_POLICY(r10, 0x112, 0xa, &(0x7f0000000200)=0x5, 0x4) [ 568.999239][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:16:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x500}) 07:16:09 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x28da0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 569.104151][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 569.110000][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 569.344169][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:16:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x4000000000000ba, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x600}) 07:16:09 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf0ea0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:09 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xce, 0x0, 0xffffffffffffff9a, 0x0, 0x354}, 0x80000001}], 0x40000000000013e, 0x10041, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, &(0x7f0000000080)=0xffffffff) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:09 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2b000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x700}) 07:16:10 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf4010000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:10 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:10 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2c000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x900}) 07:16:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = socket$inet(0x2, 0x801, 0xff) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x5) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000080)=""/183) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPKT(r3, 0x80045438, &(0x7f0000000180)) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xa00}) 07:16:10 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf5ffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:10 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2f8a0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:10 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x5000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x5, &(0x7f0000000200)=""/64, &(0x7f0000000240)=0x40) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r2, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10802310}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r8, 0x3cd653e41480affc, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x400}, 0x45490) 07:16:10 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x6b, 0x0, 0xfffffffffffffe80) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) accept$nfc_llcp(r2, &(0x7f0000000080), &(0x7f0000000100)=0x60) recvmmsg(0xffffffffffffffff, &(0x7f0000001f00)=[{{&(0x7f0000000180)=@nl=@proc, 0x0, &(0x7f0000000200)=[{&(0x7f0000000300)=""/230}], 0x0, &(0x7f0000000400)=""/216}, 0x8}, {{0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000240)=""/64}, {&(0x7f0000000500)=""/75}, {&(0x7f0000000580)=""/235}], 0x0, &(0x7f0000000680)=""/222}, 0x2}, {{&(0x7f0000000780)=@in6={0xa, 0x0, 0x0, @remote}, 0xfcf3, &(0x7f0000000b40)=[{&(0x7f0000000800)=""/162}, {&(0x7f00000008c0)=""/181}, {&(0x7f0000000980)}, {&(0x7f0000002040)=""/160}, {&(0x7f0000000a80)=""/94}, {&(0x7f0000002100)=""/49}]}, 0x81}, {{&(0x7f0000000bc0)=@ethernet={0x0, @broadcast}, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000c40)=""/250}, {&(0x7f0000000d40)=""/92}, {&(0x7f0000002140)=""/54}, {&(0x7f0000000e00)=""/190}], 0x0, &(0x7f0000000f00)=""/4096}, 0x7fffffff}], 0x422, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r8, 0x9}, 0x8) sendto$inet(r5, &(0x7f00000024c0)="051589f922128701ce231859b56e3bd8e6df8e73086c8ce07bd481ad8a6cbaa4cd8a56eaf91658f6065589dbcedb26f954f91c660ec3cbccca79f07ce038414e31966d5348eaf0ff39e50315e2aa662c0f196d193dae881c057c4e34089436ded4f7df152d93b6040e8cb4e116c5fd0572cc07a4e6e2dae09a9f2fe4f5bfe603079676771b9877c02e927869e6a63305013f502226", 0x95, 0x8000081, 0x0, 0x0) r9 = openat$cgroup_procs(r4, &(0x7f0000002480)='cgroup.procs\x00', 0x2, 0x0) fchdir(r9) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x5, &(0x7f0000002300)=[{&(0x7f0000000980)="63323adf4527954528034c010c7f5a326847f1a9880fea2d46d594528f33f280d0411f282443d6e2d7ebf7d47438b4ab5fcd3d269f96e39348cfd27abfc6bbfff954bc7aa0d0a17c7e21470a69227182d709528d", 0x54, 0x1}, {&(0x7f0000000a00)="cbdcbd905ce417ef6db9df979049f6640c00273a3a75fa0e8b7758a13094c2f8e87edb8cec01904a12f89429984b1d15daf86f4f7f7375b5c804f555fce21abb962f5c1afe011d408eba986b479fb6eff71df3a8562c1d5804d3963aa6d732e076a8715ed4ad4a65541d11a4ad", 0x6d, 0x1}, {&(0x7f0000002180)="30ee3b2c500eb19abc858d150869d792d701f61a6c8cdf621d6dc01352b05cb2c1bdc8f154e52f2ec48b56d5b45b5fd686143861b02c75a5e00a9b78e9111be3675b5b39a333d5e830d4bdc493c33686bde9976c911c1232b86c3e0deae941c4a31fbc26784bf76bbbd8c97f5b77727789a51334a7c539b2b5765b522e5e0e070016920df8df93545813fce81af17bbd", 0x90, 0x9}, {&(0x7f0000000280)="e21e4c43efc837c4f826fcafb93d8c965c4064d6390541dd1afa1d942af4d6dfe21aba98b3174cafe4a6199606ecfaaf", 0x30, 0x1ff}, {&(0x7f0000002240)="aad227e4290770f0c86e9e07e0643fa82c47d5a369e812b3990e046558480500eba4d9b56ae3d37320c0babc517ca5b5936afc32bb11812f28feb39069dd3d1391c9520608be6fbd79223418c79cde09f3b14981e3000c554334bfece03efbdbb83ab3b0ea1f5ebb8f149ac9076e5fbd100868ff3e882344c289ecbc5b440488dc7c620a5a1fb010ff1879be3a604c26df19228807", 0x95, 0x1000}], 0x10, &(0x7f0000002380)={[{@data_writeback='data=writeback'}, {@lazytime='lazytime'}, {@nodelalloc='nodelalloc'}, {@grpquota='grpquota'}, {@usrquota='usrquota'}], [{@smackfshat={'smackfshat', 0x3d, '\'\\'}}, {@fowner_gt={'fowner>', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) r10 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000002400)={r3, 0x5, 0x6, 0x5, 0x5, 0x80000000}, &(0x7f0000002440)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = syz_open_dev$vivid(&(0x7f0000000b00)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_ENCODER_CMD(r11, 0xc028564d, &(0x7f0000000dc0)={0x1, 0x2, [0x400, 0x0, 0x3, 0x3, 0x80a8, 0x7, 0x40, 0x3fffc]}) preadv(r10, &(0x7f00000017c0), 0x33d, 0x0) 07:16:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xb00}) 07:16:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x80) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x80000000, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:10 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf79a0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xc00}) 07:16:11 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = dup3(r1, r2, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r9, 0x9}, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000300)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000440)={@empty, @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x7, 0x3, 0x0, 0x5, 0x40200000, r10}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) pselect6(0x40, &(0x7f00000000c0)={0x400000000, 0x800, 0x7, 0x4, 0x8, 0x88, 0x3, 0x978}, &(0x7f0000000180)={0xfffffffffffff7eb, 0x792, 0x3, 0xbae, 0x1ff, 0x96, 0x1, 0x101}, &(0x7f00000001c0)={0x6, 0xfffffffffffffd31, 0x5, 0x5, 0xc000000000000000, 0x4, 0xf15}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={0xffffffff}, 0x8}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000080)=0x800, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:11 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x300b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:11 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) ioctl$TIOCSCTTY(r3, 0x540e, 0x100000000) open_by_handle_at(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="3d0000000000000059f5b7411243688e8a6300fee6909db9dd61504017427607b1384e3b00b3dd076b857c66e997dda17965aca1e77516141efe0e01c3"], 0x81) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r11, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r11, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r12, 0x9}, 0x8) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000300)={0xfffffffb, 0x2, 0x0, 0x9, 0xa, 0x3, 0x8, 0x0, 0x4, 0x6, 0x1ff, 0x78}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0xd0, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x4, @rand_addr="05391ece432d2d96a727d867788d7a16", 0x8001}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0xe8}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x75a4, @rand_addr="1b8df3be1ff7f1e6b3a5365dc2d55487", 0x40}, @in6={0xa, 0x4e24, 0xfffffffd, @mcast2, 0x6}]}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000200)={r13, 0xfffffffb}, &(0x7f0000000240)=0xc) r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r15 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x18040, 0x0) r16 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r16, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r16, 0x84, 0x66, &(0x7f0000000040)={r17}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r15, 0x84, 0x22, &(0x7f00000004c0)={0x3, 0x200, 0x7, 0x2, r17}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x2, 0x2, 0x4, 0x1}, 0x3c) clone3(&(0x7f0000000440)={0x218000, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), 0x16, 0x0, &(0x7f0000000500)=""/179, 0xb3, &(0x7f00000005c0)=""/4096}, 0x40) r18 = socket$unix(0x1, 0x5, 0x0) bind$unix(r18, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r18, 0x0) r19 = socket$unix(0x1, 0x5, 0x0) connect(r19, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r20 = gettid() r21 = gettid() sendmmsg$unix(r19, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r19]}}, @cred={{0x1c, 0x1, 0x2, {r20}}}, @rights={{0x14, 0x1, 0x1, [r18]}}, @cred={{0x1c, 0x1, 0x2, {r21}}}], 0x70}], 0xfd, 0x0) r22 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r22, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) ioctl$sock_FIOGETOWN(r22, 0x8903, &(0x7f00000015c0)=0x0) r24 = syz_open_procfs(r23, &(0x7f0000000340)='net/\x19p_mr_vif\x00') preadv(r24, &(0x7f00000017c0), 0x33d, 0x47) 07:16:11 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf81b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xd00}) 07:16:11 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x105003, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = dup(0xffffffffffffffff) write$eventfd(r2, &(0x7f0000000240)=0x1ff, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2000000000000000840000000200000000000400000000000000f300", @ANYRES32=0x0], 0x20}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x72, &(0x7f0000000180)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr="a19706000000000000007239686d1e73"}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e20, 0x4, @rand_addr="2fe6a0ed85bfd6f778e0f5bc54ae0761", 0x3}}, 0x49, 0x7, 0x5d298501, 0x0, 0xfff}, &(0x7f0000000040)=0x98) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r8 = accept$unix(r7, 0x0, &(0x7f0000000500)) recvmmsg(r8, &(0x7f0000000280)=[{{&(0x7f0000000080)=@can, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000400)=""/207}, 0x40}], 0x1, 0x40012042, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) 07:16:11 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x30be0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xe00}) 07:16:11 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) r3 = dup3(r0, r2, 0x140000) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080)=0x9, 0x4) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) 07:16:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x1100}) 07:16:11 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x33000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:11 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf8ce0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:11 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8, 0x10000) write$binfmt_elf32(r1, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x1, 0x3f, 0x0, 0x7fff, 0x6, 0x6, 0x10000, 0x24d, 0x38, 0x3ce, 0x4, 0xfe, 0x20, 0x1, 0x8, 0x6}, [{0x6, 0x5, 0x8, 0x800, 0x7f, 0x4, 0x9, 0x7ae8}], "39b41b53de313c7ac558423d88e5e5afabb21588ebcf00b7c956d8b93c44fb1a1331c28972b2447d14903f079dd5427befbf8c2cee5cb3b4f6ba7fc3daa390e95953ae546070e3df251320f300d9db4bb1a675bf6fff8a1ba4d3cb", [[], [], [], [], [], [], [], []]}, 0x8b3) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x1200}) 07:16:12 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000080)={@rand_addr, @local}, &(0x7f00000000c0)=0xc) 07:16:12 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfc000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:12 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x376e0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r4, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) bind$isdn(r8, &(0x7f0000000080)={0x22, 0x3, 0x7f, 0x8, 0xdc}, 0x6) 07:16:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x2500}) 07:16:12 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfe800000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:12 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x3d, 0x0, 0x0, 0x0, 0xfffffffffffffef7}, 0x1}], 0x195, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x1, 0x0, [0xab, 0x200, 0xffffffff, 0x7ff, 0x0, 0x2, 0x3f, 0x3]}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cachefiles\x00', 0x19000, 0x0) setsockopt$inet6_int(r2, 0x29, 0x46, &(0x7f0000000440)=0x8, 0x4) 07:16:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x4000}) 07:16:12 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x38a20000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7f, 0xfd012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8) 07:16:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x5c00}) 07:16:13 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfe80ffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:13 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000140)=""/213) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x400, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x8b901) open$dir(&(0x7f0000000080)='./file0\x00', 0x40000, 0x20) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r8, 0x9}, 0x8) getsockopt$llc_int(r4, 0x10c, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0x4) r9 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) bind$rxrpc(r9, &(0x7f0000000280)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x24) 07:16:13 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000100)=0x0) r7 = syz_open_procfs(r6, &(0x7f00000000c0)='net/xfrm_stat\x00') preadv(r7, &(0x7f00000017c0), 0x33d, 0x47) 07:16:13 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3b000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:13 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) pwrite64(r4, &(0x7f0000000080), 0x0, 0xff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) accept4$rose(r7, &(0x7f0000000080)=@short={0xb, @remote, @remote, 0x1, @default}, &(0x7f00000000c0)=0x1c, 0x40400) 07:16:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xe7ff}) 07:16:13 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfec0ffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:13 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfeffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xfdfd}) 07:16:13 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{&(0x7f00000004c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffdac}}], 0x1, 0x40, 0x0) r0 = getpid() getpgid(0xffffffffffffffff) ptrace$setregset(0x4205, r0, 0x2, &(0x7f0000000440)={&(0x7f00000003c0)="30f96630c56a30f79960f0e41fc585de05d1d3155f6fe6fe97c4037349b519b1e92aeb0697b204f749dcdc8b4cd27fb12f05ac8b1c2aca681735bdb32dbbabe9e8d22ab71ac9390001df73f0132c92796bb5b9c3f5", 0x55}) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = socket$inet(0x2, 0x4000000805, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000300)={0x8, {{0x2, 0x4e22, @loopback}}}, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(r5, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400500}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r6, 0x10, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0xe040800) get_thread_area(&(0x7f00000001c0)={0x8, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1}) r7 = gettid() r8 = gettid() sendmmsg$unix(r2, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {r7}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r8}}}], 0x70}], 0xfd, 0x0) r9 = syz_open_procfs(r8, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r9, &(0x7f0000000000)=[{&(0x7f0000000840)=""/109, 0x6d}, {&(0x7f00000008c0)=""/231, 0x356}], 0x2, 0x47) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) migrate_pages(r10, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x8) 07:16:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xffe7}) 07:16:14 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3c000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:14 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000001, 0x3fa1}, 0x0, 0x0, 0xfffffa7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0x3fff800000}) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:14 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xff000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0xfffffe96, 0x0, 0xfffffd71}, 0x6}], 0x1, 0x40000040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x3, 0xe3a, 0x9db, 0x4, 0x1}, &(0x7f0000000800)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000840)={r6, 0x5}, 0x8) r7 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) pwritev(r1, &(0x7f0000000780)=[{&(0x7f0000000200)="95800197060d94765835ce4556472d9437babc1e03667cede5224d02ec9ac6b50865f4dbc6233c570dd0e917cf1ae5d544b2663241010b68e1de915f0501e634849a6507c5275e47b44527a50b0d340c3c9d0a44d9e50546bf2f18ed2ca187cc306279aa", 0x64}, {&(0x7f0000000300)="77b5476c9adf5f0dcd658a21702634dfeb2c3040c80df8e100598901534edbcbdffd926aeb4e101b0053c89d63f89c825ed054e60412d40f1203dc0dbfdc29fdd1507547154e658c6fd7f6c0ce6b31140142a023940a091a5f766e55cbe25a1856da8a5d332905dcdecd13a1d73619ecc53bed4e518393bcac86a2ef639f29d92ed7", 0x82}, {&(0x7f00000003c0)="d8bfe3adb4ffcfb6e225accbce5b1982dd8230a538ef3c242e1cf0eab19c79fc3bb0cad420ec6912adc83427d4e77c4b64a707a1fbcd527c041f69db1594ea01c3fc6d3271490f6b957118fc6ecf925ad4d862157129f5e41ccd4c196a0e2cc4b03d85379e9fda0621f38b28706efaa5b2ed540b505585c47eef8f52f4b063357a003127b21005afe380f7d7ed80a18ba99d2ad432b70e47baaf2be1b475b03d58c70b0ec8f225a27f4995635151393f347a58c1250aa1e950ad0f53ef6803e60ceb9c15ebeff6db72c2a77433d45c68aff8e0595e82c5f1512ca1ced9", 0xdd}, {&(0x7f00000004c0)="8be165a351f9026391328b99fc6ca5fb3c8d0d0f4d6b0e63166282c909a00dfedde7aa595e50e2a1f57b70377bbb2b5b73d432fcf005c78fff32ec8a2876cd00a359fa823826073940a04a6c654037794e72d5c64a5a77", 0x57}, {&(0x7f0000000540)="74fa46cfbe0981fad3d359ba9051384a48af07d9bc9fce3012fe5067779091f95e20b6a37ab0e5d683e5adb98148cc1c89e20853f3babfaba11bb79f36e013b56ae45e3eb451eddf818bc50c73892afbdc747442b350d040b63a8da6eccbd31fd805a8d79770a68f726f8699e94f48c6170dc045d4b53f3efb8fa92dfaebcade9049a978f6444d6887955e304e7ace55f3cf8208562f8794b8cc77659a3dc1f5395cbb9f6e3bc7bcc546e380", 0xac}, {&(0x7f0000000180)="3118ceff19dba6506ce1bf2d524d503f5d12892b6658f40b578e60d8eacf07ff99c0521ef0", 0x25}, {&(0x7f0000000600)="edfaad366b10becaf24dc0adc3d079c1ff440af3b0d432c113342f2b4b0bd709bdb971f18df1e99359f625f6c273617e2b51a3daeb32ae24ec71b0e79521429c3da65975491e2f7a12791fbc6bb7955eb1ddc7fd1f1e5ab63dc42c7cd0255833167cbbd4e9deb065bd063b7f824f2e6b8a80c20720b2e4a847dd3ecbda8a19f9f4807c58188978a994d6f2095f43764c3d7327839c12813dec1b46d43a316c4908a4e4987b7d061d95df821cec0985f2c5769a2e83341bdf550700b8a41ea932a174d7eae4f4cc6a5ea8e780e53dd130b9bc", 0xd2}, {&(0x7f0000000700)="157dbeb9cd26dd5d2b18d8f290f7fdf1c8ac9b5112cc43af57336d5b7baab153f5cd9ad5c064da65a68c6e6419b46a79d31fb40fecb0bb21d6b10b6f02e59d2c47838171668194092b8072a158a28cb8a2255f62e10d42c4a396b96f610a6bf4f1831c1ff2f2919cbeb0ef8b3a9e0ee94f4810a6b67b50f594fe2946", 0x7c}], 0x8, 0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r8, 0x9}, 0x8) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000100)=0x1) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 07:16:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x1000000}) 07:16:14 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) dup2(r1, r0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r6 = socket$inet(0x2, 0x4000000802, 0x4) r7 = socket$inet_sctp(0x2, 0x5, 0x84) clone3(&(0x7f0000000500)={0x90000900, &(0x7f0000000180), &(0x7f0000000280)=0x0, &(0x7f0000000300), 0xa, 0x0, &(0x7f0000000340)=""/209, 0xd1, &(0x7f0000000440)=""/153}, 0x40) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x9, 0x9, 0x3, 0xf3, 0x0, 0x0, 0x18400, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x9, @perf_bp={&(0x7f00000000c0), 0x6}, 0x400, 0x7f, 0x8, 0x7, 0x400, 0x1, 0x6}, r8, 0x8, 0xffffffffffffffff, 0x8) r9 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = gettid() getpgid(r12) dup3(r10, r11, 0x0) connect$l2tp(r9, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r10, 0x4, 0x1, 0x2, 0x3, {0xa, 0x4e21, 0xfffffffe, @ipv4={[], [], @multicast2}, 0x80}}}, 0x3a) [ 574.237258][ C0] net_ratelimit: 26 callbacks suppressed [ 574.237265][ C0] IPv4: Oversized IP packet from 127.0.0.1 07:16:14 executing program 4: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0}, &(0x7f0000000480)=""/250, 0xfa, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={r0, 0xb4, 0x11}, 0x0, &(0x7f00000001c0)="330c4619d98487e046c2f3402ad39aca674d0a193b1c2113002cb15f8a656872791a593dc27e44d08deff331b977944dc3ca5ddf86dcb6edb0acc204af01bf8772e4d2ed0b06d0ee9ca0e6edb96e28a3149af4dd4fad44ad3bd6ed4022e8278d16e55fb0d517103d9fbde90144be4a7115ad8f4e3f394e3ed3f0f4d91ced71a0028faf5e572c0ec84feddeaebd34222a6ddae6f2f1bbe45e41c989b7c0b7c2e2287efc2af874acd09bcabbf26b627a119d9b55a0", &(0x7f0000000280)=""/17) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x47) mount(&(0x7f0000000080)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='rootfs\x00', 0x80008, &(0x7f0000000140)='\x00') 07:16:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x2000000}) 07:16:14 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3d000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:14 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xff7e0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:14 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000680)={@rand_addr="bf527bf6bed48740c072e76b1019dfe4", @dev={0xfe, 0x80, [], 0x2b}, @rand_addr="2130b444cdf3ab93317903ec2ab7cf8f", 0x7, 0x7fff, 0x3, 0x0, 0x6, 0x0, r1}) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r11, 0x9}, 0x8) getsockopt$bt_BT_DEFER_SETUP(r7, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r12, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) preadv(r2, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/159, 0x9f}], 0x1, 0x0) 07:16:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x3000000}) 07:16:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/189, 0xfffffffffffffd99}, {&(0x7f0000000180)=""/26, 0x1a}, {&(0x7f00000001c0)=""/80, 0x50}, {&(0x7f0000000240)=""/129, 0x81}, {&(0x7f0000000440)=""/157, 0x9d}], 0x5, 0x3) 07:16:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x4000000}) 07:16:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:15 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x9, 0x121a00) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) 07:16:15 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3f000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:15 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) 07:16:15 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffff0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x5000000}) 07:16:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x6000000}) 07:16:15 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffff80fe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:15 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x5, 0xd3, "e6385a1c67ddf326e9f0a34bc5684e5c763977bd8682c92003d2daca31079082be4d5b2aee7ed2bc5e96b1e29cd9fadb407afd93f52de174a6171d8d859320", 0x1f}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000180)="22ac27da489fa630e1d796559c9fb840a9089c51e262466354bd6c397f419d2e94b8dfac935a29ee2d", 0x29}, {&(0x7f0000001300)="f5d46d30ec83a9c0cf5bad2b0819bd9f128b6948112b77dbf83c35098f9c828c24d0365891f411a9fe197762f3a9e14d3d715f61e9821b8e1c229366ab537ac334d7e0740a2d32272cf73286345dbb6ae7e9440fea0786", 0x57}], 0x3, &(0x7f00000013c0)=[{0x108, 0x118, 0xffffff0b, "d6594b2697bc7d8305ad2be956c017c2b7be6bfd97dec4fb9d9a5d0c23685f744d22c3ce305c1de131456347660b44ab54ad843c60a2c79a0db16ff5988daea1cac4fb384676d613210273f8908f8fdb12bb383fde2f3f7e9d9b44a0d1c316f871afac4d6a083f0e7584d1d4227990ef62631567d900ddb8492f0060951cd631cb8650e15b1bc43238efc30eaabc9d9df8b256e490355b4ee16e22a5a7ee83a472da2ac8b171bb08e82dc53a4f8c57b4512bc5c681e4f6e75b8d1f624f7c268a96e0ea6fff9656d35e7f3c0ee7f86d1e7b07713a2077f9e68d8567a9d9455e959988e8c8169f0ca707e12e4552a62d742634"}, {0xd8, 0xb, 0x8, "faba6ca6242ccbb0810064afdbb224889b5d6fff0f69f73ac91b761d1d95c9f227fc330138380feaa709880a1c1ca59a24b773868ffc0845c911504aa3794d1d03bcb4bed5f76ad43e468cb1d0c086728c1004cf4ec6589184d21514b97c8e34ee03d9372d4a14eafd99001a82d6627519c3fabdfcec6732340c7ae1ee8c3144482b9bede728fe484678f507f7865d23b689c2e990ae84a814ea5d19cefab7146192bc48fcccbd6728233232544719ee58c3bda288fbfd1dbe473e14553ead43b9c1a5fb"}, {0xa8, 0x19b, 0x6, "bf01de4ed58fdde43266cf22953d92250a29f3b1d7f5c6fb649cdb4f5e32d650ee4381e147187d434d0131a823be5ee04562f0a3901dc64687de3ddd7cbdbfc12aff7e273ea5cd69e89be05e71527a56573799b183401c6cea300be1ac433c1cce36803da25002568e9f5dcb9fe70fcb46148c03af7b5b57bda775a0920c35c6159fd8d7687d03f692bd30b9a4866f533c908111"}, {0xc8, 0x3a, 0x0, "745e4bbbc3e9b23280574b095d0563f8abde88b9fe1e4f2ef8df55dc0ae37fb5acea103cf13f3efd3337d88b36e2203d148426a69559ad29f693ff2d01e9cd8fd35f9ad2df80be5059fdcd478f77aa748d0d21aa547c2f3f8bfc03f0a55c5f665b2d6f872217e1361509659b330ce239558e8d7157c2de0aeb2cc5a18874c984c13697e553bc6248b0cee49162169feb8a8aa2190848622c0e659fdb2094f7a0e5e877264c60a2267499a5061a4bc5742bde3d"}, {0x48, 0x115, 0x1f, "b7b10fefe01f61c7234dc373cc5e50345371b042025190a129fff1fdcd7a0afe0751787fb49b1a2d747616c464cca26b428d352bc57b8afc"}, {0x60, 0x0, 0x9, "8bca5aad16db43824e638ed570533b5a7de755d8df8f4d5638cbd1985a0da8c1bd2fd35d786b6d32b49414b1024d54f3f376c20db1c6b08a433ca7dafc3ab2c2e69a3b5f12e7e118fa6c365a4cfdb88c"}, {0x58, 0x80, 0x8, "7bdedda999870299e0ad7487b698f1d7ce5ba8acd422777fa97405ed9fcb4f2be1918a4d3feba740527af26c7de90d9d553231ade469c9399bd651a0738c871a5e13bdaa"}], 0x450}, 0x40) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8202, 0x2, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x24) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) r6 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4000, 0x6) ioctl$UI_BEGIN_FF_ERASE(r6, 0xc00c55ca, &(0x7f00000000c0)={0xe, 0x1, 0xff}) 07:16:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x7000000}) [ 575.104164][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 575.110015][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 575.116036][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 575.121809][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 575.127669][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 575.133505][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:15 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0, 0x167, 0x0, 0x2db}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2000000000000000840000000200000000100400000000000000f300", @ANYRES32=0x0], 0x20}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="26df3e5e20df3fe1661c3e9e3f3c", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x72, &(0x7f0000000180)={r4, @in6={{0xa, 0x0, 0x0, @rand_addr="a19706000000000000007239686d1e73"}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={r4, 0x7f}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r5, 0x6, 0x6, 0x1, 0xfff, 0x1}, &(0x7f0000000140)=0x14) [ 575.166905][ C0] IPv4: Oversized IP packet from 127.0.0.1 07:16:15 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3f520000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 575.344158][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 575.349994][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(0x0, 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:16 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffffc0fe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x8000000}) 07:16:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0xc0000) sendto$inet(r0, &(0x7f0000000200)="f3beb7b49a7d5567b9b5a0c21f97d198cd5c6d61a4ba1aed1eaeb3fedb8e35e6544a4fb7236569c1fac8ae5730ced96eb085998f830f53f5f223682525b302254e4e1e7d95bfb9ad3014c795e608fe0486a418ac170b0de37c0c6334bcf5930494d001a0a6587a5a291cb820d6e1492658644934c3b50be9f276", 0x7a, 0x80, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:16 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) recvmmsg(r1, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0xffffffffffffff36}}], 0x1, 0x0, 0x0) sendto(r2, &(0x7f0000000080)="336646f817caaab17f860d29d15ca9200b6db3cc2b138312ad338509a6ad2bacbf40db9363c66aafca14b615cd07ffed7c7b8b7bf4ffdb20f3fb5413a1988e6762e11dfbce1a1d78f49b87e82fd70e7ee089", 0x52, 0x4, &(0x7f0000000100)=@isdn={0x22, 0x7f, 0x40, 0x1, 0x69}, 0x80) r3 = socket$inet(0x2, 0x4000000805, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r8, 0x9}, 0x8) connect$llc(r4, &(0x7f0000000200)={0x1a, 0x110, 0x55, 0x8, 0x8, 0x40, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r3, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) getsockopt$llc_int(r10, 0x10c, 0x4, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r11 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r11, &(0x7f00000017c0), 0x33d, 0x47) 07:16:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x40000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x9000000}) 07:16:16 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffffff8d, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xa000000}) 07:16:16 executing program 4: lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00', &(0x7f0000000100)='@em1\xe4wlan0trustedtrusted\x00', 0x19, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x10041, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x47) 07:16:16 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = gettid() r5 = gettid() sendmmsg$unix(r3, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {r5}}}], 0x70}], 0xfd, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r6, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r6, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000000c0)=0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) kcmp(r5, r7, 0x5, r9, r1) r10 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r10, 0xff) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r11, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r11, 0x0, 0x48f, &(0x7f0000000080)={0x6, @multicast1, 0x4e23, 0x1, 'none\x00', 0x4, 0x1, 0x16}, 0x2c) 07:16:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x40860000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(0x0, 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:16 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffffffe0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xb000000}) 07:16:16 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') socket$inet6_tcp(0xa, 0x1, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x47360000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0, 0x0, 0x0, 0x1c4}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:17 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000480)=""/32, 0x18}], 0x1, &(0x7f0000000500)=""/154, 0x9a}, 0xffff}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000005c0)=""/207, 0xcf}, {&(0x7f00000006c0)=""/58, 0x3a}, {&(0x7f0000000700)=""/186, 0xba}, {&(0x7f00000007c0)=""/50, 0x32}, {&(0x7f0000000800)=""/10, 0xa}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/110, 0x6e}, {&(0x7f0000000980)=""/84, 0x54}], 0x8, &(0x7f0000000a80)=""/252, 0xfc}, 0x8}, {{0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000000bc0)=""/129, 0x81}, 0x4}, {{&(0x7f0000000c80)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000d00)=""/196, 0xc4}, {&(0x7f0000000e00)=""/169, 0xa9}, {&(0x7f0000000ec0)=""/58, 0x3a}, {&(0x7f0000000f00)=""/55, 0x37}], 0x4, &(0x7f0000000f80)=""/18, 0x12}, 0x5}, {{&(0x7f0000000fc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002180)=[{&(0x7f0000001040)=""/154, 0x9a}, {&(0x7f0000001100)=""/86, 0x56}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x3, &(0x7f00000021c0)=""/80, 0x50}, 0x10}, {{&(0x7f0000002240)=@rc, 0x80, &(0x7f0000002640)=[{&(0x7f0000003000)=""/142, 0x80}, {&(0x7f0000002340)=""/157, 0x9d}, {&(0x7f0000002400)=""/82, 0x52}, {&(0x7f0000002480)=""/101, 0x65}, {&(0x7f0000002500)=""/42, 0x2a}, {&(0x7f0000002540)=""/250, 0xfa}], 0x6, &(0x7f00000026c0)=""/191, 0xbf}, 0x5}, {{&(0x7f0000002780)=@nfc_llcp, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002800)=""/155, 0x9b}, {&(0x7f00000028c0)=""/147, 0x93}, {&(0x7f0000002980)=""/45, 0x2d}, {&(0x7f00000029c0)=""/155, 0x9b}, {&(0x7f0000002a80)=""/242, 0xf2}, {&(0x7f0000002b80)=""/73, 0x49}], 0x6, &(0x7f0000002c80)=""/110, 0x6e}, 0x6}, {{&(0x7f0000002d00)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002d80)=""/38, 0x26}], 0x1, 0x0, 0xfffffffffffffcfd}, 0x9}], 0x8, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x101000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) pipe(&(0x7f0000000040)) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000b80)={0x2, 0x9c}, 0xc) getsockopt$netlink(r3, 0x10e, 0x7, &(0x7f0000000340)=""/197, &(0x7f0000000440)=0xc5) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000300)={'ip6gre0\x00', {0x2, 0x4e21, @rand_addr=0x100}}) ppoll(&(0x7f0000000100)=[{r2, 0x8050}], 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x1000}, 0x8) r8 = add_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r8) 07:16:17 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfffffff5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xc000000}) 07:16:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000100)=""/67) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r1, &(0x7f00000001c0)="3ef5d6c681447ece84946fa6c58c8ceca560b3d98fcf8ed18aaaae12a4674ba2f44ae7e88bacae3d3ef8e0b75f10f1206af4a66f3d695860e9b37d22aa75bc581e11728c94466f734ba8c6ba7f5228185b649d98999a2ffde066e6499c4daaf1bfcc5bc7a3535c8f012901086fc5633756211519e0babde78dfda8193815223edcde8dee75e8d62d618734a88be9ded4a0ba09e2b8bdc2edd8ca65f791e291a5125d2f5287aa0c675c902ae93d4fae1c2616dcab9f7a0b9e891004b86026cc2a4413c8908299a98590be8a523550bfec376d13ef1f1a0f8e86823ebfc538e5d2eee354f9b7b5631914d6b794080d83", 0xef, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}, 0x101}, 0x1c) flistxattr(r1, &(0x7f0000000080)=""/89, 0x59) 07:16:17 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfffffffe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xd000000}) 07:16:17 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x10000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x47e90000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(0x0, 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:17 executing program 4: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) recvmmsg(r3, &(0x7f0000003140), 0x249, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r4, &(0x7f0000001680)=[{&(0x7f0000000000)=""/105, 0x69}, {&(0x7f00000001c0)=""/145, 0x91}, {&(0x7f0000000280)=""/44, 0x2a}, {&(0x7f0000000300)=""/4082, 0xff2}, {&(0x7f0000001300)=""/203, 0xcb}, {&(0x7f0000001400)=""/5, 0x5}, {&(0x7f0000001440)=""/134, 0x86}, {&(0x7f0000001500)=""/81, 0x51}, {&(0x7f0000001580)=""/231, 0x37f}], 0x9, 0x47) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 07:16:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xe000000}) 07:16:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x10000000}) 07:16:17 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:17 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:18 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x48000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x11000000}) 07:16:18 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') clock_adjtime(0x0, &(0x7f0000000080)={0xffff, 0x200020000000000, 0x8, 0x5, 0x9, 0x5b29, 0x3, 0x6, 0x80000000, 0xfffffffffffffffe, 0x9, 0x0, 0x1b14, 0x8000, 0x4, 0x4, 0x80, 0x7, 0x9, 0x100, 0x65, 0x380000000000, 0xffffffffffffff55, 0x5, 0x2, 0x80000000}) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:18 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0xa4, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0xfffffffffffffc85}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x138, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0xa4}}, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f00000001c0)='lazytime\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000006800)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001c003c9c38828cec6bca880584112fe88188db6524f5443a8ac91c5da1b0294d39d1fe3cd5f9d676f76993e73869517d6f958a35a490e2282c5fea3e0ae1bb3c886ccffe589af89a27755cc9f32b627789f59df59c6c203fd2cb453404fb58bae4c5f78d332a14dd3e4096dc548b78c09ba9cec4f50e7727b101f02ea46d20c553b1ec6ad4cf09cc8baad07e63f7e8067d786230df63361bdf9552b55b7d991acd1c4e3850da9a7bd9115596d6d45a2eda6d293097b0e84ac43cc4f39ffc54de26eac3567cd4c5513fbe0fae49488b7cdc5eae9246e77e969b6ab5f94f4af5"], 0x1}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x9, 0x0) preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) 07:16:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x12000000}) 07:16:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x486a0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(0xffffffffffffffff, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:16 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000640)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000600)='/dev/input/mouse#\x00', 0x8, 0x2280) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x6b, 0x0, 0x8) r11 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f00000003c0)={'vet\x00\x00\x00_b\x1f\x1cC\xa5e\x00', 0x0}) r13 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r13, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r13, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r13, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r13, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r14 = socket(0x200000100000011, 0x803, 0x0) bind$packet(r14, &(0x7f0000000200)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @remote}, 0x14) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) bind$xdp(r13, &(0x7f0000000900)={0x2c, 0x0, r15}, 0x10) sendmsg$nl_route_sched(r10, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=@newtclass={0x3c, 0x28, 0x1, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r15, {0xf, 0xd}, {0xffff}, {0xe, 0x5}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0xcce}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44824}, 0x4004000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r16, 0x9}, 0x8) sendmsg$nl_crypto(r7, &(0x7f0000000940)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x40040000}, 0xc, &(0x7f0000000900)={&(0x7f00000007c0)=@get={0x110, 0x13, 0x400, 0x70bd26, 0x25dfdbfd, {{'rfc7539(ctr-aes-neon,sha384-avx2)\x00'}, [], [], 0x2000, 0x1000}, [{0x8}, {0x8, 0x1, 0xfffffff9}, {0x8, 0x1, 0x3f}, {0x8, 0x1, 0x4}, {0x8}, {0x8, 0x1, 0xfff}]}, 0x110}}, 0x8000) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000006c0)={0x3, 0x0, [], {0x0, @bt={0x1, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x9, 0x7f, 0xd8, 0x5, 0x724, 0xffffffff, 0x81, 0x200, 0x40, 0x1e, 0x8}}}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r0, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) ioctl$sock_proto_private(r0, 0x89eb, &(0x7f0000000080)="e7c0a46bd21a459c444028ae3f393571d66a60be66140e9c43afd8a06fd4eee45980cb3ecfcbd5e2185cf145e856e9aa2bd0bf73359962764de7050952dba91caa9016ef4b33e0e68a27dadbf0e23d19183483d3410fd1d5caf6756b7ea713124bfe30c49d05ed9c27e668666731b59aacf0b040c7ede673a238ab9c6644c4063b2ad6bd8e19ba0664a8913f7ad3a11a451a94861c7ffa7e2f09ce3ba0b64632ffa529f13c71590de3edc66903ae061bc1dba298f115") r17 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r17, &(0x7f00000004c0)=[{&(0x7f0000000540)=""/150, 0x96}, {&(0x7f0000000140)=""/254, 0xfe}, {&(0x7f0000000300)=""/171, 0xab}, {&(0x7f0000000240)=""/114, 0x72}, {&(0x7f00000003c0)=""/232, 0xe8}], 0x5, 0x47) 07:16:16 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x25000000}) 07:16:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000000500)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/10, 0xa}, {&(0x7f0000000180)=""/159, 0x9f}, {&(0x7f0000000240)=""/80, 0x50}, {&(0x7f0000000300)=""/95, 0x5f}, {&(0x7f0000000380)=""/14, 0xe}, {&(0x7f00000003c0)=""/122, 0x7a}], 0x6, &(0x7f00000004c0)=""/52, 0x34}, 0x3}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4c000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x40000000}) 07:16:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x8800) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f00000000c0), r6}}, 0x18) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r7, &(0x7f00000017c0), 0x33d, 0x0) 07:16:16 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x5c000000}) 07:16:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4f1a0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xe7ffffff}) [ 579.264174][ C1] net_ratelimit: 12 callbacks suppressed [ 579.264181][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 579.275652][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 579.281414][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 579.287178][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 579.292954][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 579.298732][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:17 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0x0, {0x80, 0x0, 0x20, 0x2d, 0xff, 0x81}, 0x3, 0xfe}, 0xe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000080)) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r4, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r4, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) preadv(r4, &(0x7f0000000140), 0x1000000000000289, 0x80000000000002) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r10, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r11, 0x9}, 0x8) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r12, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="00b752a9eadfed000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x66, &(0x7f0000000040)={r13}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000300)={r13, @in6={{0xa, 0x4e21, 0x92, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, [0x80, 0x1, 0x6, 0x8001, 0x9359, 0x4, 0xed0, 0xfffffffffffffff8, 0x6, 0x0, 0x9, 0x80000001, 0x100000000, 0x6, 0x655]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000400)={r14, 0x82}, 0x1ec) r15 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r15, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r15, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) getsockopt$llc_int(r15, 0x10c, 0x9, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 07:16:17 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4fcd0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xfdfdffff}) 07:16:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(0xffffffffffffffff, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:17 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r4, 0x9}, 0x8) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x4000135, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x47) 07:16:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xfffffdfd}) 07:16:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000080)={0x9, 0x27b, "9646260f7e39dd97c936d86253ae7389890672a3e3132c26", {0x8, 0xb9}, 0x5}) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x4, 0x6, 0x5}, &(0x7f0000000140)=0x20) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x390) [ 579.514181][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 579.520016][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xffffffe7}) 07:16:17 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x10000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x504e0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) [ 579.744152][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 579.750054][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:18 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb3000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(0xffffffffffffffff, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0xffffffff}) 07:16:18 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r4, 0x9}, 0x8) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x5, {0x3}}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x47) 07:16:18 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x57b10000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:18 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x902, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xffffffa5}}], 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) 07:16:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500"}) 07:16:18 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) bind$bt_hci(r1, &(0x7f0000000140)={0x1f, r2}, 0xc) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:18 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x58320000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:18 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x100000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:18 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x530}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) r6 = open(&(0x7f00000001c0)='./file0\x00', 0xd32dd27cc247a90b, 0x1) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000000200)={0x1, [0x21]}, 0x6) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000180)=0x8) r7 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r8 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x5c, 0x101000) setsockopt$IP_VS_SO_SET_ADDDEST(r8, 0x0, 0x487, &(0x7f0000000300)={{0x29, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e24, 0x0, 'lblc\x00', 0x2, 0xfdf, 0x58}, {@rand_addr=0xffffffff, 0x4e23, 0xe7a2d3b1373fad49, 0xfffffffb, 0x7, 0x80000000}}, 0x44) move_mount(r1, &(0x7f00000000c0)='./file0\x00', r7, &(0x7f0000000100)='./file0\x00', 0x55a7a09f6cec9333) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x2}) 07:16:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x1d0, 0x480000) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000100)=0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = gettid() r5 = gettid() sendmmsg$unix(r3, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {r5}}}], 0x70}], 0xfd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) 07:16:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:19 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x3}) 07:16:19 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r1, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x4, 0x1}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r2, 0x8}, &(0x7f0000000140)=0x8) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:19 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x103000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:19 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x58e50000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:19 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f0000000100)={0x3, "ed56372092fffeb886c3e7749f0708155dc69bb6f4f6d011d9348cfc92d28fbd", 0x1}) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r4 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r4, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 07:16:19 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x4}) 07:16:19 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x200000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:19 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5f950000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:19 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x5}) 07:16:19 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = socket$inet(0x2, 0x3, 0x4) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) sendfile(r3, r0, &(0x7f0000000080)=0xf8, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:19 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r0, r1, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) recvmmsg(r2, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x6e}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x47) 07:16:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x6}) 07:16:20 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x300000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000080)=""/251) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) sendto(r4, &(0x7f00000001c0)="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", 0xfd, 0x40, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x1, @remote, 'rose0\x00'}}, 0x80) pipe2(&(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f00000013c0)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x9}, 0x8) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r6, 0x110, 0x4, &(0x7f0000000380)=0x2, 0x4) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r1, r3) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000300)={0x78, 0x0, 0x3, {0x6fda97c0, 0x4, 0x0, {0x4, 0xff08, 0x6, 0x7, 0x6, 0x7, 0x3, 0x5, 0x7, 0x9, 0x7fffffff, r1, 0xee01, 0x0, 0x100}}}, 0x78) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x858116, &(0x7f0000000180)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@cachetag={'cachetag', 0x3d, 'net/ip_mr_vif\x00'}}], [{@subj_user={'subj_user', 0x3d, '+em0vmnet1!'}}, {@obj_user={'obj_user', 0x3d, '*vboxnet1wlan0\xe4self#'}}, {@hash='hash'}, {@dont_hash='dont_hash'}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_role={'obj_role', 0x3d, '}}systemposix_acl_access'}}]}}) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvmmsg(r4, &(0x7f0000002cc0)=[{{&(0x7f0000001600)=@can, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001680)=""/201, 0xc9}, {&(0x7f0000001780)=""/106, 0x6a}, {&(0x7f0000001800)=""/55, 0x37}, {&(0x7f0000001840)=""/159, 0x505}, {&(0x7f0000001900)=""/201, 0xc9}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/16, 0x10}, {&(0x7f0000003180)=""/4096, 0x1000}], 0x8, &(0x7f0000002ac0)=""/37, 0x25}}, {{&(0x7f0000002b00)=@hci, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002b80)=""/132, 0x84}], 0x1, &(0x7f0000002c80)=""/52, 0x34}, 0x5}], 0x2, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, &(0x7f00000003c0)=0x1, 0x4) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') write$P9_RXATTRWALK(r6, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x8}, 0xf) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r7, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r7, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x47) 07:16:20 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x60000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x7}) 07:16:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x8}) 07:16:20 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/99, 0x63}, {&(0x7f0000000140)=""/213, 0xd5}], 0x2, 0x45) 07:16:20 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x400000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:20 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x60160000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r6, r8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r11, r13) setresuid(r8, r9, r11) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) io_uring_enter(r4, 0x5, 0x8edb, 0x0, &(0x7f0000000180)={0x4}, 0x8) r14 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r14, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) write$input_event(r0, &(0x7f0000000080)={{0x77359400}, 0x0, 0x0, 0x66}, 0x18) 07:16:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:21 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x500000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:21 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000080)={0x0, 0x2, 0x101, 0x84000, r6}) ioctl$int_in(r7, 0x5452, &(0x7f00000000c0)=0x1) 07:16:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x9}) 07:16:21 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x60c90000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:21 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xfffffffffffffff9, 0x0}, 0xfffffffc}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) recvmsg(r2, &(0x7f0000002740)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000100)=""/129, 0x81}, {&(0x7f00000001c0)=""/195, 0xc3}, {&(0x7f0000000300)=""/58, 0x3a}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/168, 0xa8}, {&(0x7f0000001400)=""/4080, 0xff0}, {&(0x7f0000002400)=""/1, 0x1}, {&(0x7f0000002440)=""/136, 0x88}, {&(0x7f0000002840)=""/168, 0xa8}], 0x9, &(0x7f0000002680)=""/160, 0xa0}, 0x20) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000002500)={0xc7, &(0x7f0000002900)=""/199}) 07:16:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xa}) 07:16:21 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) connect$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x3f, 0x9, 0x8, 0x1, 0x7, 0x2}}, 0x8) 07:16:21 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x1, 0x100, 0x0) socketpair(0x2, 0x3, 0xe0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) preadv(r2, &(0x7f00000017c0), 0x33d, 0x47) 07:16:21 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x64000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:21 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x600000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xb}) 07:16:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0xa, 0x0, &(0x7f0000000000)) 07:16:22 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000280)=""/227, 0x1b3}, {&(0x7f0000000380)=""/90}], 0x100001bb, 0x1000047) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x8}, 0x28, 0xd118ed8ad85d8c20) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}}, 0x2f8fd7427521d3c1) sendmmsg$nfc_llcp(r2, &(0x7f0000000580)=[{&(0x7f0000000180)={0x27, 0x0, 0x2, 0x2, 0x4, 0x7, "501ef0667996f5c3f57daccfedc582eca9af9aff8f2beae067a835f87d9e6a53658ecde6d2828c7e17a7d1d49f7295df0c450f3b538baa865ed139699d1ed2", 0x2f}, 0x60, &(0x7f0000000540)=[{&(0x7f0000000200)="3dca66559c45eab775a5cdb3a102e46c77e36be8f9e4dcede1165f23ba5b6732a99d7d4b5481ad4fe5e542490a50852dadeee940dc0dd98794646d39f2a91fa71f13accb64e70013d643be33ce1c7db74fb14452b84087028d9780514aa965ea352bc4f05897e9a2d3000937f1c1c07dffd577e3f786e54c4c93", 0x7a}, {&(0x7f0000000440)="584283c8e7db24243328253f5d27a61eeb776049e152c3fa1ffcbd2456cb42fd16c8a9ff4fd2aa083848771404a805575fa0fa31bfb5b863669058506460abde7c9a719250f949f4287c7ef49f0c14815b35b8fbc620470079d468c0113672ff4386aa9a58f7c20b253add5a39b7729929df444316d89d4ab8e185512411d5ac284507d6678edc1e1befad3001bee92f01d42ab5392c59bbe3850546323d87b0edfac66bba533fa52c0537bd6cdb639fb50dad8ca728ac9a11969f9408ab925aeab23d4bd247cbf7ef3c6601f52f3fc06ac46c9d3770a7d5acfdfce5f3820ba97af25c9b96e796fdca72", 0xea}], 0x2, 0x0, 0x0, 0x40}], 0x1, 0x2040800) 07:16:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xc}) 07:16:22 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x700000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:22 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x67790000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xd}) 07:16:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="285474dae6badf3a960eca58356ed2eb", 0x10) sendmmsg$alg(r1, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="76d478a0f7d4f8bf736a8256072fd3d6", 0x5000}], 0x1}], 0x49249249249263a, 0x0) 07:16:22 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x763000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:22 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x1, 0x2) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x6, 0x3, 0x0, 0x15, 0x0, 0x70bd2a, 0x25dfdbff, [@sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e24, 0x1, @mcast1, 0x4}}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e24}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @remote}}, @sadb_lifetime={0x4, 0x7, 0xc7d8, 0x4, 0x1, 0x6}, @sadb_ident={0x2, 0xa, 0x0, 0x0, 0x1f}]}, 0xa8}}, 0x800) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r0, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) recvmmsg(r7, &(0x7f0000003140), 0x0, 0x40000000, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') 07:16:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xe}) 07:16:22 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x68000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x10}) 07:16:22 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) socket$nl_route(0x10, 0x3, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x17, 0x4, "bd3b517f00b1032c07957ae3b4480618eae4b43272ff563371b8d54007371e832f1c5157949edb9dda677bef0c9673cabd2bd8ddcb6e5ed80ebeb713d7dfe21a", "802f052b250c598718d2f60600000000000000070000004c74fe000000000001", [0x7, 0x5]}) 07:16:22 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:22 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x68ad0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) accept4(r0, 0x0, 0x0, 0x0) 07:16:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) read(r0, &(0x7f0000000400)=""/168, 0x41c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="2b000004030000007e062719f24018f3ee60db1c3f91a34a0000000000000000020267908e59e863b3d0dab4000000006d6435738f6d73656c660052769f263a447d0600fd81acc7c73912fb678d3874d361e396f1835b50ae465651449a030dc2e13d0feb6e8d6800b85ec2d210822e80fe1a48feacd28a099b40d01ecb9b09313cad6e47fb6829a4c11980f2ddd63ae46987dae2375c41d46051565e60cb43e40a52535cc2c27d07943a8552845b38d5e3ba145d34945b3bb4c68c2b66b2ff9505f19005a6ca538036bcd5e2e6a999b35a52c584ebb98985550ba106676b8cf6178c8049225e0e10f878932ebf7d299f731da5026887bc335af38968c1e2ffc62dad00373cbadec582b44198a18313"], 0x2b) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = mq_open(&(0x7f00000004c0)='ip6tnl\x00', 0x6eb3ebbbcc0884f2, 0x60, 0x0) mq_notify(r5, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000110c0)=[{{0x0, 0x315, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r5, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) r7 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) lseek(r7, 0x0, 0x1) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000300)=0x8) setsockopt$inet_udp_encap(r5, 0x11, 0x64, 0x0, 0x0) 07:16:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x11}) 07:16:23 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) 07:16:23 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x897000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:23 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6c000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x12}) [ 585.504204][ C1] net_ratelimit: 20 callbacks suppressed [ 585.504210][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 585.515706][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 585.521476][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 585.527248][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 585.533002][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 585.538783][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:23 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8a000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@rand_addr="e80fcff006b934aa64aa1b15173dc493", @dev={0xfe, 0x80, [], 0x11}, @mcast2, 0x0, 0x7, 0xa010, 0x700, 0x100000000, 0x40, r1}) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x47) 07:16:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x25}) 07:16:23 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x900000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:23 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6f5d0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) read(r0, &(0x7f0000000400)=""/168, 0x41c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2b) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = mq_open(&(0x7f00000004c0)='ip6tnl\x00', 0x6eb3ebbbcc0884f2, 0x60, 0x0) mq_notify(r5, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000110c0)=[{{0x0, 0x315, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r5, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) r7 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) lseek(r7, 0x0, 0x1) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000300)=0x8) setsockopt$inet_udp_encap(r5, 0x11, 0x64, 0x0, 0x0) 07:16:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x5c}) [ 585.744156][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 585.750001][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:24 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') syz_open_pts(r0, 0x844000) preadv(r0, &(0x7f00000017c0), 0x33d, 0x47) 07:16:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) read(r0, &(0x7f0000000400)=""/168, 0x41c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2b) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = mq_open(&(0x7f00000004c0)='ip6tnl\x00', 0x6eb3ebbbcc0884f2, 0x60, 0x0) mq_notify(r5, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000110c0)=[{{0x0, 0x315, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r5, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) r7 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) lseek(r7, 0x0, 0x1) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000300)=0x8) setsockopt$inet_udp_encap(r5, 0x11, 0x64, 0x0, 0x0) 07:16:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xe7}) 07:16:24 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:24 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x70910000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 585.984143][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 585.990021][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:24 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, 0x0, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x300}) 07:16:24 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @raw_data=[0x8001, 0x3, 0x7fffffff, 0x5, 0x1000, 0x7fffffff, 0xfffffffd, 0x3f, 0x20000002, 0x9, 0x506e, 0x400, 0x1000, 0x40, 0x9477, 0x1, 0x2, 0xff, 0x7, 0x10001, 0xb7, 0x9, 0xd9, 0x0, 0x2, 0x2, 0x3, 0x4, 0x6, 0x5, 0x6, 0x3ff]}) socket$inet_dccp(0x2, 0x6, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x47) 07:16:24 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:24 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x74000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:24 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) read(r0, &(0x7f0000000400)=""/168, 0x41c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2b) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = mq_open(&(0x7f00000004c0)='ip6tnl\x00', 0x6eb3ebbbcc0884f2, 0x60, 0x0) mq_notify(r5, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000110c0)=[{{0x0, 0x315, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r5, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) r7 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) lseek(r7, 0x0, 0x1) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000300)=0x8) setsockopt$inet_udp_encap(r5, 0x11, 0x64, 0x0, 0x0) 07:16:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x500}) 07:16:24 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = gettid() r3 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}], 0x70}], 0xfd, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000280)='net/ip_mr_vif\x00') r5 = request_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='net/ip_mr_vif\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={r5, 0x73, 0xd5}, &(0x7f0000000180)={'enc=', 'raw', ' hash=', {'sha384-ce\x00'}}, &(0x7f0000000200)="9b3c5b72b088004cca63c9d21cb9daf99a12780673a8584efa8d954458db439e7b2af75e3be89b7c69b862d040b4860d28de3343480f5764efdffe8367d1ba0a269ceb7ef7f45ca830366ecdf55c5cef35e80de530b920862da5b6165361ebc58f17832faed60df4bf4636dc08f4690027b3d6", &(0x7f0000000300)="f4e1b3ca677b4289efbaa464af9fce5f12902a5aadd971efb8d9240d0259536a61fcaf8a7ce20e13a011bf4fb39267c58b402e21646cc67709cc08e641f861f15be0007074edc01716272cd8bcc213251bc580c55fddc76bd07382ddf1667c264e1db3385833159605baa98d325d46df83d7ffc67753d9669e15682a4020a2792e2f8e7ab9b2a35f0c0a9f64e0b84cfd1d5f6724c562ec59a15958e94dc2bfcf7f6e7d0f252b3097517c041470fe8d11669c4c6968b2e2c330e5527d6b7ccc304387aa95965a41c3decc78ed675aef55ff323dd266") preadv(r4, &(0x7f00000017c0), 0x33d, 0x47) 07:16:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) read(r0, &(0x7f0000000400)=""/168, 0x41c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2b) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = mq_open(&(0x7f00000004c0)='ip6tnl\x00', 0x6eb3ebbbcc0884f2, 0x60, 0x0) mq_notify(r5, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000110c0)=[{{0x0, 0x315, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r5, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) r7 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) lseek(r7, 0x0, 0x1) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000300)=0x8) setsockopt$inet_udp_encap(r5, 0x11, 0x64, 0x0, 0x0) 07:16:25 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:25 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x77410000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x600}) 07:16:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, 0x0, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 07:16:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x700}) 07:16:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) read(r0, &(0x7f0000000400)=""/168, 0x41c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="2b000004030000007e062719f24018f3ee60db1c3f91a34a0000000000000000020267908e59e863b3d0dab4000000006d6435738f6d73656c660052769f263a447d0600fd81acc7c73912fb678d3874d361e396f1835b50ae465651449a030dc2e13d0feb6e8d6800b85ec2d210822e80fe1a48feacd28a099b40d01ecb9b09313cad6e47fb6829a4c11980f2ddd63ae46987dae2375c41d46051565e60cb43e40a52535cc2c27d07943a8552845b38d5e3ba145d34945b3bb4c68c2b66b2ff9505f19005a6ca538036bcd5e2e6a999b35a52c584ebb98985550ba106676b8cf6178c8049225e0e10f878932ebf7d299f731da5026887bc335af38968c1e2ffc62dad00373cbadec582b44198a18313"], 0x2b) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = mq_open(&(0x7f00000004c0)='ip6tnl\x00', 0x6eb3ebbbcc0884f2, 0x60, 0x0) mq_notify(r5, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000110c0)=[{{0x0, 0x315, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r5, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) r7 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) lseek(r7, 0x0, 0x1) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000300)=0x8) setsockopt$inet_udp_encap(r5, 0x11, 0x64, 0x0, 0x0) 07:16:25 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x77f40000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:25 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x900}) 07:16:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xa00}) 07:16:25 executing program 4: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x2}, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa]}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "488800", 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) 07:16:25 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:25 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x78000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x53a, 0x3ff, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x40000, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0xfffffffffffffe88) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) read(r0, &(0x7f0000000400)=""/168, 0x41c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x2b) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = mq_open(&(0x7f00000004c0)='ip6tnl\x00', 0x6eb3ebbbcc0884f2, 0x60, 0x0) mq_notify(r5, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x4000) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000110c0)=[{{0x0, 0x315, 0x0}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002a00)}, &(0x7f0000002a80)=0xc) syz_extract_tcp_res(&(0x7f0000000340), 0x20000000000005, 0x1f) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r6, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) mq_notify(r5, &(0x7f0000002940)={0x0, 0x2000003f, 0x0, @thr={&(0x7f0000002800)="af66bfe98e95b8cc6a3dced16eb4f5f7e6490cfed992463a3a03faeae42fd6c34280bb44a5e1e56ec8fa0c59ad9a3baa971b39a11fd6c410d7b51bec30ca0523dbebed287de315c9ffb166a5aba7ade4d4df4f26cdeeda59bd7da10798a29832f9de04b603b3c1421976ca57f56ac67df7d67bf9e5da6560ed2ee1132032", 0x0}}) r7 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) lseek(r7, 0x0, 0x1) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_INITMSG(r7, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000300)=0x8) setsockopt$inet_udp_encap(r5, 0x11, 0x64, 0x0, 0x0) 07:16:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, 0x0, 0x0) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xb00}) 07:16:26 executing program 4: creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x2}, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa]}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "488800", 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) 07:16:26 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:26 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x78750000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r6, r8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r11, r13) setresuid(r8, r9, r11) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) io_uring_enter(r4, 0x5, 0x8edb, 0x0, &(0x7f0000000180)={0x4}, 0x8) r14 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r14, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) write$input_event(r0, &(0x7f0000000080)={{0x77359400}, 0x0, 0x0, 0x66}, 0x18) 07:16:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xc00}) 07:16:26 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4c000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:26 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0xee00, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000440)='\x00', 0x2) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x3) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdea) close(r1) memfd_create(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/150}, {&(0x7f0000000400)=""/7}, {&(0x7f0000000180)=""/65}, {&(0x7f0000000440)=""/135}, {&(0x7f0000000300)=""/65}], 0x70b, 0xffffffffffffffe1) 07:16:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xd00}) 07:16:26 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf47000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:26 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7a000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240), 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:27 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x20) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x1010, r1, 0x6e3f1000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r5 = socket$netlink(0x10, 0x3, 0xc) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r6, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r6, 0x310, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xe00}) 07:16:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:27 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffa000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:27 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7f250000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x1100}) 07:16:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:27 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)={0x1, 0x80000001, 0xfffffffffffffffc}) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="66888d9238500e1993eda8b7628debd46cac7cdc9d38b70e761f1e71f3adb435f72323304bc4a03381a4f0571ab598e01d6e2a86b696322028b3c3033e0daa9d479a78da9b97069a062b37f4c0f7ee77e128389f7195134d49aeda9deb7236167f47a46dc1ca9638374744f332d0a948aec3f7ac81d27cf4079c4db809db1c7a3f6aa0ae03c70691eff8f03cc8ff8e1650ba80bdc0c424283101d1abb6baf61c9440093bea9bd7e2bcd05e75d5cc3865e0cd8aa55754098edab598c438b9f15b341aa54f778981bf94a1ba83a606fad5b3e876c7eb0f490b25a1b807faf5104b746e545cc044b65d8bd82caba73cc9cdae1a951da6", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000200)={r9, 0x40}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:27 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x1200}) 07:16:27 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7fd80000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240), 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x2500}) 07:16:28 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)={0x1, 0x80000001, 0xfffffffffffffffc}) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="66888d9238500e1993eda8b7628debd46cac7cdc9d38b70e761f1e71f3adb435f72323304bc4a03381a4f0571ab598e01d6e2a86b696322028b3c3033e0daa9d479a78da9b97069a062b37f4c0f7ee77e128389f7195134d49aeda9deb7236167f47a46dc1ca9638374744f332d0a948aec3f7ac81d27cf4079c4db809db1c7a3f6aa0ae03c70691eff8f03cc8ff8e1650ba80bdc0c424283101d1abb6baf61c9440093bea9bd7e2bcd05e75d5cc3865e0cd8aa55754098edab598c438b9f15b341aa54f778981bf94a1ba83a606fad5b3e876c7eb0f490b25a1b807faf5104b746e545cc044b65d8bd82caba73cc9cdae1a951da6", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000200)={r9, 0x40}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:28 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x107b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:28 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x80040200, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x4000}) 07:16:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52ba3daf52889e49, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x11, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000500)=0xa000000000000005) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80, 0x7}, 0x0, 0x4, 0x0, 0x20}) stat(0x0, 0x0) lstat(&(0x7f0000000780)='./file0\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f00000000c0)={0x0, {}, 0x7f, 0x5}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) lsetxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000001300)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRES64=0x0, @ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB], 0x8, 0x0) lchown(0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)=0x7, 0x4) 07:16:28 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1100000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:28 executing program 4: getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x31, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_mr_vif\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)={0x1, 0x80000001, 0xfffffffffffffffc}) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="66888d9238500e1993eda8b7628debd46cac7cdc9d38b70e761f1e71f3adb435f72323304bc4a03381a4f0571ab598e01d6e2a86b696322028b3c3033e0daa9d479a78da9b97069a062b37f4c0f7ee77e128389f7195134d49aeda9deb7236167f47a46dc1ca9638374744f332d0a948aec3f7ac81d27cf4079c4db809db1c7a3f6aa0ae03c70691eff8f03cc8ff8e1650ba80bdc0c424283101d1abb6baf61c9440093bea9bd7e2bcd05e75d5cc3865e0cd8aa55754098edab598c438b9f15b341aa54f778981bf94a1ba83a606fad5b3e876c7eb0f490b25a1b807faf5104b746e545cc044b65d8bd82caba73cc9cdae1a951da6", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000200)={r9, 0x40}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 07:16:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x5c00}) 07:16:28 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x80590000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 590.340359][T24455] device nr0 entered promiscuous mode [ 590.846851][T24700] device nr0 entered promiscuous mode 07:16:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240), 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xe7ff}) 07:16:29 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1200000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:29 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x87090000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x400, 0x4) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) recvmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001000)=[{0x0, 0x343}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)=""/5, 0x5}], 0x6}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) 07:16:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xfdfd}) 07:16:29 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) semget(0x3, 0x4, 0x104) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) recvfrom$netrom(r1, &(0x7f00000001c0)=""/195, 0xfffffffffffffed4, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @empty, @remote}, 0xc) r2 = socket(0x0, 0x4, 0x0) write$binfmt_misc(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="9e99e940ffc276a91ba1447287cd4d0501c125e2dd898a345d2b90e7c5cd045696a276f96d17fbb05795a6a8803ba4870740b82f8e908b9d151055f69f440cd290538f6e1fea206e9e2b1cea152e75e1e3bca612aaacdd8818792694b946ba8c8c62a39536097d0550ffc1f13acfeb5ca2782ae30856e112b40ab29fed4105a8bc89ba27fb7edf5869d1c1d371"], 0x32) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='@{!%systemprocsystemGPL\x00', r3) socket$caif_stream(0x25, 0x1, 0x3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x11a303097927cabf, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002b) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r5, 0x40405514, &(0x7f0000000080)={0x4, 0x6, 0x1, 0x9, 'syz1\x00', 0x804}) connect$caif(r4, &(0x7f0000000000)=@rfm={0x25, 0x10001, "b21a3f96ae2cfc1fd6f1bf4e54f1da1b"}, 0x18) 07:16:29 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x87bc0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52ba3daf52889e49, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x11, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000500)=0xa000000000000005) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80, 0x7}, 0x0, 0x4, 0x0, 0x20}) stat(0x0, 0x0) lstat(&(0x7f0000000780)='./file0\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f00000000c0)={0x0, {}, 0x7f, 0x5}) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) lsetxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000001300)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRES64=0x0, @ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYBLOB], 0x8, 0x0) lchown(0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000040)=0x7, 0x4) 07:16:29 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x172b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xffe7}) 07:16:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x1000000}) [ 591.654944][T25137] device nr0 entered promiscuous mode 07:16:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x883d0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:30 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x17de000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x2000000}) 07:16:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000400)='gfs2\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000180)=0x1) chroot(&(0x7f0000000000)='./file0\x00') r1 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0xf8, 0x0, 0x20, 0x6, 0x0, 0xb337, 0x81902, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffe, 0x5, @perf_bp={&(0x7f0000000140), 0x1}, 0x3fc14, 0x0, 0x2, 0x0, 0x9, 0x4, 0x4}, 0xffffffffffffffff, 0x4, r0, 0xa) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x6d, 0x7f, 0x4, 0x1, 0x0, 0xfffffffffffffff7, 0xc1100, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x8}, 0x20c0, 0x2, 0x8000, 0x2, 0xf5, 0x7, 0x6}, 0xffffffffffffffff, 0x1, r1, 0x2) r2 = semget$private(0x0, 0x207, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f00000001c0)=""/204) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETNCNT(r2, 0x4, 0xe, &(0x7f0000000280)=""/172) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000040)) [ 591.744148][ C1] net_ratelimit: 20 callbacks suppressed [ 591.744155][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 591.755639][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 591.761436][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 591.767223][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 591.773011][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 591.778790][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x3000000}) [ 591.984152][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 591.990021][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:30 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x185f000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 592.060820][T25151] gfs2: not a GFS2 filesystem [ 592.224150][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 592.229961][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x88f00000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x4000000}) 07:16:30 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1f0f000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:30 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x2, 0x46) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000100)=0x4) r6 = socket$inet6(0xa, 0x800000003, 0xff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) r10 = dup(r6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r11 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r12 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) io_submit(r13, 0x4110, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r12, &(0x7f0000000000), 0x10000}]) sendfile(r10, r11, 0x0, 0x8000fffffffe) 07:16:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r4, r5, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r6, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) r7 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x4, 0x141000) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000004e40)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r7, &(0x7f0000005000)={&(0x7f0000004a40)={0x10, 0x0, 0x0, 0x84020000}, 0xc, &(0x7f0000004fc0)={&(0x7f0000004e80)={0x128, r8, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffef6c}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x36}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf46d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffa}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}]}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7294}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x128}}, 0x4014040) recvfrom$inet(r6, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) sendmmsg(r4, &(0x7f0000004c80)=[{{&(0x7f00000001c0)=@isdn={0x22, 0x1, 0x81, 0x46, 0x4}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000240)="3829415694a582112a", 0x9}, {&(0x7f0000000280)="4ba1c946ff6520f46c3641bbea5ca1244638c359e8e4d4762f7991bbdad698eccb07d3494bd9fc11183b82004cd4ad0f4fc3910233f79044198de987c6c89eb0b0ad96022d55ee6e9d252b6399b48843", 0x50}, {&(0x7f0000000300)="70cbe7bef519c0024ff7f21ade569a4e9b360f40e46f5de90a4f9601cb43804e26b9426f5228e60fb371f584baaf9b1149f3b49bccf088af1066a30d9c9db4fb30f280b6113c6114f41205763bec1b87984e540ebc8046c964266ad07e9b423425f63e47d1136a5e2f1f63e3ad5c657d9c5f30a6c240", 0x76}, {&(0x7f0000000380)="1da0c989907266e936134a048ddc0663904c8a49397ad31d5c78b20dadfda2d622e6321d28096b0205d753c8d4d10e1f1d3d1da1d4b6d93e9c3cc6950c26baa98f8bfd8fd5702658e3eb5938674117fd4b320836444e716c8c20585562678b831a13c3c3f878732f96f3ab55cb2a719e9616fa2a7e9540", 0x77}, {&(0x7f0000000400)="4c1ba6f44a4cfc29cea1bb78fb60e5cd2c7353b32b26c2d5528d19900d159a9c8deb5b68aab0a5fcbd0e49f68958d1f68a9b35a7b7c6ec55c97c1b046e71b7b78ca1914e2349a81806e7c40f032fdc35494909576e0f36ea5f1868d40e78281e9206d1af9bdfb496e6a345ccd65091578c00ed7930157f0bcbb86f1620d6ee516cb1a76faca6e851c7a99ec26e026608dacc5ed11d51dd766c766b899356f2876827c9b57cda55e6daf6b1571a9a6f406c5bd3c097c204d8be3fd44543cbc91454299fea7973a75d32fdb94396dc26d277b7327a", 0xd4}, {&(0x7f0000000500)="0b4192", 0x3}, {&(0x7f0000000540)="35d4aac4a8e156bfca3374462f77ab840d774de453c2ba7221fcb2b0553f0c8c0fadd54a1d95c5bbbd8a7ce125ae009f789b822ae0c1280675ece97a194284befac606c198aa956e158264f998c6ddeaf5fa6f12bd64ed2384863de888151c40d431ce07a2d6b8a8049a9a64093fac06a26847fba62e7bd6e91247c8b6955a123085caa3e66f35bb07c3be2d4ba2df45d960e714acc7d3fe93d1ce743c3d9467", 0xa0}], 0x7, &(0x7f0000000680)=[{0x20, 0x108, 0x9, "39bd3cda185ea49497b7231d9c6c"}], 0x20}}, {{&(0x7f00000006c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000740)="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", 0x1000}], 0x1}}, {{&(0x7f0000001780)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001800)="39744949df99679708c88fd745393dd0ab1a580ccf60b5e2de720ca6002bf85f70ddc0e81a332f277f11e65d040abd35235146dd4564b0f3568b696e96236da16e83f0c5723447ec5426579d6417fe2701356cd4a1a5f59ed5fec6c38d8820577057ed6fcb8ee3f119680feb3f52099824a2dd44a4d6c22ab8c266793c71f3b498c030e547b4d32c4a15b84633c4310f45c7a16395bf6d97a8c0ed6dc3601e101dd898d76dc40b1e54f00da8d93f27688a510c61c3fa4dc585b83b6a27679221950b588cffd52e8ced840658dffd6bea18eca967f411473b701ef2d976460b3489fb551b2275a7f2a850e1c159ae43a36fc89e5773", 0xf5}, {&(0x7f0000001900)="20067bc32f3b57876e7e9a38750be2c9901b06f7daa8bd4332105e4f51fb2df1e4c22a6f68a0186e00120b6de48ea443ed65f06d4e927f7937a8ac01d9721f1101d4ceff70bccef53315f2cebd9d36241d75ef54eb479c4dfcc16e208da671ee0445b287ff79357a84977bcabf157b1fda9098907fffe9efebfe33cf20bff2", 0x7f}, {&(0x7f0000001980)="08adb5054d47827956c2978cfc7fe418911e803eb56b487cf096b68f0d146dd2dcc80537e87015baf134e7e7ae44193cba7aea07819fa938cb1125f5c6d65e4197d4ec15e14eac8a3460d75ab80e5eaeca179cd695714be1011644a30c74784faa1db40a1b6923e804f003950d6f9c4d3986b30415211fa17776", 0x7a}, {&(0x7f0000001a00)="6c84fa51eb06d859b5f0cb7692ab57cc2bf41e0074814e1e3c996973e76a95d127ba8670e574a3", 0x27}, {&(0x7f0000001a40)="b888a7f41b3029a80d72e431f80e927b1f007d0935ce95001df04e914dba1f1e7d1865a443ccc7307dd625ff030000000000008a5e608c1383324b6d14", 0x3d}, {&(0x7f0000001a80)="460b4db9f53e79b6941df7c03d49e194dda44b2b74f75991e73799bc775e5accabe74d034fe6728266d80cb8723b7099c8579c26477f520a4d872842eee024ee384163cafe7b613ac47041df035ee9a5818e93d9dd868342df0047030a5ff1f796a8979f08e7df3f6d2cd726f6ad05f08aced936998471d0c42807898f8a2e327cc648cb17cf578a3096dee1e51a6130c44c9aaf702db6308abbfde7d21532fab778e53b92e77b5d91a22b2a2d40e306fc2c398cf81d52e3308927db146fb347f2", 0xc1}, {&(0x7f0000001b80)="9822beacc0de4fe3e08d7d8de71f7cb93c56a0479be7e82a302c988dce0ddaf2b12776e5e1df4af4d4f029e7bdde8c8275c3edcdab4006610c7d8796f06aec646c28f1a7197b0df32a5770e620955d48e7e6223ce1038597d9ac4af49f4a88dad0b8e4be8155852b3bf0960379adc0bf2260e846506648c886686e858b9714395d6c9cc7f9a2726fde3bdce65d58cf0a3cec80a7ed4b6fba157ee381214c4ea854fc6014db707f47ecf94af02b66c8569279675a481be1dc743e2f7f", 0xbc}], 0x7, &(0x7f0000001cc0)=[{0x1010, 0x3a, 0xe, "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"}, {0x28, 0x115, 0x10001, "2546b895d050e9417d3576ab91a6e15e56d848e8be2207d4"}, {0xd0, 0x35fd96aec1bf0b03, 0x400, "7c0efab969717ac145e52d01de0aeb4e21ce2ee1e5b4c582791c0ac167a0b58211c09ac0f1b59d05f03171cce67670b8f7c1b6765d7d54d254961a45cbdab419949f106b08f0d645dbed2f89465cc402d2417311cd0a137224984c44a87113afc48308aabb7cff22dba1073aa9955a8b0e983a75328237243e1b18fdcdea292f4d4d9f959f484e26e6394382008e44a3d1d977329f6ca2a5be1226e6963f600de9bb66888946958c954da36cb69b694e3371b02f5f36e53db4c0d0c674fa51"}, {0x38, 0x1c, 0x2, "6ab79997e1b6fd0eeeb568cadcd7d288a7f7facecdc96a7dac025d055714df8adc13969b4b2ee88d"}], 0x1140}}, {{&(0x7f0000002e00)=@pppoe={0x18, 0x0, {0x0, @empty, 'veth0\x00'}}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002e80)="8a31c941261a8b93cd9382cb094004532f6a61cba2b4b3d4eea9419bea48a94c4e47169a2b27679645bbeddb5bb7721ec3a139ac4e5e44644c5265c3fbe2b3d353075bfbf8f2b34ee31475a526930213f23090859f1951ee3f1966b237cf81eb5be0095e3eb40002", 0x68}, {&(0x7f0000002f00)="aa810c2f537f10dff9827a7fd2bafb55ed09b06f49f6c9be4a80a45ba8829559c92cb936c882cbcda4611dc5bed53448cd62824ebb6caad13a48622cd1fcde7e436114851f2e752bf45d", 0x4a}], 0x2, &(0x7f0000002fc0)=ANY=[@ANYBLOB="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"], 0x1010}}, {{&(0x7f0000004000)=@tipc=@nameseq={0x1e, 0x1, 0x907c6a1309ddd99e, {0x41, 0x1, 0x1}}, 0x80, &(0x7f0000004340)=[{&(0x7f0000004080)="19652394b999895c29c681996638fc1571ead203a9816bd126d7c100198a3e54429d1603c461a136f65936e19106d2cb63d04b1a6a3ec7c408c2abde313554dfefafc020625c822bb0da21a2d373bff1a8645443738a9a8aabfdd37713e492e648307931bf105335bfc4d404aa3c68a270863c37539f2747cded4d5ff94b107fa65ffca09b5eb65e3cdefe57c3e55a07344737cc876b2efb36dd3b78d732de448a1433c98df0d85497f0", 0xaa}, {&(0x7f0000004140)="0ce27923b570faa63590105cc81778245049b618d19aa96451537dec0beebfb008ec4ca16aaec1d18c799a2564a5fe194e420db9c0cb2b21358c7d6cb84b8c64c5d3b109c724b4b3e8ae61c18bcd2db11f5dce050fbb8d52ce7ada65ac93595b3f9c3d84f22ad3964410df373a96d65210bf5c2e488a6ede62416aa0608c188a67c5f482c60e9d89068e54528d0a25f5c73c9f9cfa2d409ffd0944b2b98ae51dee2f0ad7f30d743775107a50fc83df", 0xaf}, {&(0x7f0000004200)="40864f4f228bf627186ced241fe93bd57c412691123d689b5ccd9d0df55388bab02b42432c863866f1bb7d6d80c1b553d48a8688f5dc8a1728e0f3b1e3df7710734d704b5201eabb9250501c2c05957b18e90738657bbd95cb515ebc1c6a1d0db443531572a8648c367f13c6f74ad92ac06764d0cb9fc5687f4972181993be2bda90dc91c6eb1f01c9840bfb", 0x8c}, {&(0x7f00000042c0)="90a91bb14d57f7af69c950eb7db39510f46397f3ac25976215991a7dff3e3d11ab6d3b2c5bca8a392c4c67d824c856961742bd8f7a908f841748fa315bcf9079edc3c5c5ca98eeeb9646fb6cd88470535124016254", 0x55}], 0x4, &(0x7f0000004380)=[{0xa8, 0x21a, 0x4, "618994cb69a54bb17c3d261898486ffb87c70dc1d23a41d196e9176d2dfe2b5953f8a3f6c74ef02dee3ea92890171957295673df9e91b5047f9efc26541e80765cad6a4dfc6eb4665c9eb5159542834ba7ea515eb6c703029685579e68b9d7a2b3bfdc9c74679024c73011977cc3486339f775cff3558f25636759d2c07e3a808a6912cfab5924cd73c0435b58d11f63056b295624a55e47"}, {0x30, 0x110, 0x7fff, "1a38a6bf83d21190991bbd4f7adb47cf0400b95ede2dbf778917"}], 0xd8}}, {{&(0x7f0000004480)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000004800)=[{&(0x7f0000004500)="d6c01cdeb618585598d4d043e2b8ad6c514c1d091e3cada02f751ed386a78391f1ecce7a6803ff46f93d4943045aec251608076b8bdb7fda7a91dd7776f10b9326b3580ea5cf51df0ad77dc2561c3b99ce1d0b1ea00a75d8a7e9fad7ca5b46b6c8325be56067ae7c4679a56f1c12dd28f5b25c0134f01fc02a746638c5f019aeb6fcab7492ae273e4b798ce41f6d3591bfde6062d906c386e1079de3dfef0927c53eb504b4e054b543b16be713bde9da757660112bc1f39c1bb6ef1383ebc07eac10a178c166d7914d3475962fe357a758e1f6417f05", 0xd6}, {&(0x7f0000004600)="a9520f6114d06d1aaa02ecad6b88c2ec89688ca88323f6b4f699dd9a555f757b484acd2ccd6b2e7a96b7e8", 0x2b}, {&(0x7f0000004640)="27283ffdb9462f2810a17586845d008b706f2b93fc1d72953e323c6c1fd2a248a87fe1caae7ca258d1e9e89c3743b9ee7dfa8f4d3da69b4e984bad6a1d04a5587e19b7a288e5b21e675eb0ec845b0ca875a8616e940513acb62a5da123679b3bd1a73862e79a9021114eb61df22b5cd48700b6ccf7931d743246b2dc76f5403dfe7d431c5134", 0x86}, {&(0x7f0000004700)="384bc71519dd5fa47c7192242d8f68bd59cd9f339c1ad75a70f975cae20b485d1f68357d53a40e43f3edd9fcfe2d151230e956ffa2e1c5723a17dc443203611c2c175e9ee775cc332f03490bd9b32eff92aa40ac0882072f958348bbc839b6842cf74776533d8f50f3fe20e44ff1e65cee2ac58c332a7bc2ddd4", 0x7a}, {&(0x7f0000004780)="674df5988c66624283c0f9e86c9b568b66932d7ccbccaa2abc48554c6d19595d403b3e57645786577861cc7b907264ca3af1d3ac31b8a138fd17ccaaba07d755bfa33ceba7d6dd8f65d64d", 0x4b}], 0x5}}, {{&(0x7f0000004880)=@pppol2tpin6={0x18, 0x1, {0x0, r6, 0x1, 0x4, 0x1, 0x0, {0xa, 0x4e23, 0x5, @loopback, 0x7}}}, 0x80, &(0x7f0000004c00)=[{&(0x7f0000004900)="267473438ea04aaf32f93789837ee3c10b7671dbf7cdfb409f78268ad7d07ee1cdf233b426cb47d85ef7a43e0395c2d176aebe", 0x33}, {&(0x7f0000004940)="eb15654d8bf771c3d10ea3dce8ed164575f6fb56de9fb6bffa22ade82f4c8d3cbf378d87859c8c558fa72f2084d17e5507c606911d61b6c059bdf11b2ceecf04a5e12ff81985da9c0f810f10a15692dd823a81b9a37a90599d6389e8c8158466f80c7bd1e44a2220c28c06674cfbe8478b2de10fc1285e411ef27a7388b218ac87088a9164ff7e14b8f981d6c65f8b6bcffd0bd4f22ba1ad66e8c41d8f169bd8959222af4dff297533ec6596ce62e3d0aa733ed8ed27006cfb5e644ff2181967cd8cbaf4e54d20d248d79abb408bfe839569f49863848bfd23caa66b16b9a38a4f6c44dae8cdbaf72121655abb", 0xed}, {&(0x7f0000004a40)}, {&(0x7f0000004a80)="93e0c215156c99d436542f28fd300c9312e0d483c059537ef133c19efd4bf610d815ad0a9e64c3002de1aec60d8d3f252f034feda8c52e56dbc4e5cb31246f539b6004ce6eeaabb36ab57f09da03f0aff2a0cfaca8d72ba9b16fcc4964a690cd05250f82ec78b152e673d4962d3e47e9098c455fbe8c33099755e05b99ddad420f49623113c2468ca800b921108990004aee605fe7b0d583d0f3ee51f9e88fde7015080fb09c21f2897219238fc1d5", 0xaf}, {&(0x7f0000004b40)="ac08da7085c2402821b1bb7304ef442f6d29132ed68f05f9706a1e7b9f703303f21a7482f608183fcb4820f3ffb2c30a0903ac1b21e5331729660ff098ddc85c996499f90c6dd8e00c9d6235d2adbb8cbb492ac201e142b464d2477a3101023a126cafcf1dd29a034e1cb5f443d2da3c8db47b538a4a7f3a4ad6d6b56a3fa4ae1f5618d18b387470704e11bdc0385db986cdd069d1a4c7b6bcb3c772c3e8792638d54d4fb89ee71fdb4a51b2", 0xac}], 0x5, 0x0, 0xfffffffffffffd7b}}], 0x7, 0x9) 07:16:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x5000000}) 07:16:30 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1fc2000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$isdn(0x22, 0x2, 0x21) r1 = socket$isdn(0x22, 0x2, 0x21) exit_group(0x101) dup2(r0, r1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x3) 07:16:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8dffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) r2 = socket$inet(0x2, 0x3, 0x1) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 07:16:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x6000000}) [ 592.772152][T25603] delete_channel: no stack [ 592.780998][T25603] delete_channel: no stack 07:16:31 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x400040) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) keyctl$chown(0x2, 0x0, 0x0, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r4, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r4, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000180)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x84, 0x7d, 0x1, {{0x0, 0x5c, 0x3f, 0x8, {0x4, 0x1, 0x5}, 0x4200000, 0x6, 0xff, 0x2, 0x12, 'securityeth0cgroup', 0x6, 'md5sum', 0x11, '/eth0eth0(bdevlo-'}, 0x13, 'trusted-eth0selinux', r1, r3, r5}}, 0x84) r6 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r6, 0x10e, 0x2, &(0x7f0000019100)=0x12, 0x4) 07:16:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x7000000}) 07:16:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8fa00000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:31 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2001001000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x8000000}) 07:16:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x90210000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x9000000}) 07:16:31 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2043000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv6_newaddr={0x40, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0xffffffff}}]}, 0x40}}, 0x0) 07:16:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xa000000}) [ 593.646342][T25945] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 07:16:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xb000000}) 07:16:32 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffff4c30}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797a31f8f1db49a08838012e6cd23fb5aef17dd455433bc1c11ca3ff9436ee3d2cd1d561c1af7671d457cb5079a93af4028b26950864232693d8066e09e08e7a9da72e5b13fa6e12ab3f83ca68f3581e32bda38416ba26dea6b71066a4604489295a165848779df87fd5d9586b88b3eed3502f34295d96fe08ffc087d3d49703525c15463ff1dae46ec74e89f688d0b62832c554623126daf543a3f2c3663c888e67ad281090ecf08aca0d900698f3e2e57ac8ef63c84b9b138f872d60371e5c3d7e89a359dd54edeb28c1a57ef7a1996191e6e0"], 0xd5) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000000)=@req={0x3fc}, 0x10) r2 = socket(0x11, 0x800, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) 07:16:32 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x20f6000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:32 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x90d40000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'vet\x00\x00\x00_b\x1f\x1cC\xa5e\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r4 = socket(0x200000100000011, 0x803, 0x0) bind$packet(r4, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) bind$xdp(r3, &(0x7f0000000900)={0x2c, 0x0, r5}, 0x10) r6 = socket$inet6_dccp(0xa, 0x6, 0x0) r7 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r7, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r8 = socket$isdn_base(0x22, 0x3, 0x0) fsync(r8) getsockopt$inet6_mreq(r7, 0x29, 0x1c, &(0x7f0000000180)={@mcast1, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'hs\a\x00', r9}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="6000000010000100"/20, @ANYRES32=r10, @ANYBLOB="000000000000000040001200100001006970366772657461700000002c00020014000700fec0ffff000000000000000000000001140006000000000000000000fa00ffff00000000"], 0x60}}, 0x0) 07:16:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xc000000}) 07:16:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, 0x0, 0x0) sendfile(r4, r5, 0x0, 0xffe4) 07:16:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xd000000}) 07:16:32 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2500000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:32 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x97840000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:32 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x8000fffffffe) r2 = socket$netlink(0x10, 0x3, 0x15) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000a00)={0x104, r3, 0x1, 0x0, 0x0, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, '\x04\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'n\x00\x02\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}]}, 0x104}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x160, r3, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0x160}, 0x1, 0x0, 0x0, 0x4000405}, 0x30042011) sendfile(r0, r1, 0x0, 0xfffc) 07:16:32 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x2, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_ident={0x2, 0xa, 0x1, 0x0, 0x200000000000000}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) ptrace$setregs(0xf, 0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f000000a000/0x3000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000780)=""/180) r1 = dup(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, 0xffffffffffffffff, 0x0, 0x4000000000dc) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$KVM_SET_CPUID2(r5, 0x4008ae90, &(0x7f0000000980)=ANY=[@ANYBLOB="0700000000000000000000000300000008000000001000003f000000da000000ff030000000000161bde290000000000070000000001000002000000030000000104000001000000040000000000000000000000000000000000000002000000000000009700000006000000e00f00000800000000000000000000000000000002000000050000000200000003000000000007000000000000000000000000000000040000005876a9330600000001000000ffffff7ff8ffffffff7f00000000ffffffdf000000000000090000e000000000000000000400000007000000e67f00000100000000000000000000000000000003000080060500000400000008000000ff000000060000000500"/282]) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x40d8012) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@empty, @in6=@empty}}, {{@in=@broadcast}}}, &(0x7f0000000840)=0x1e) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r6 = add_key(&(0x7f0000000180)='trusted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000280)="c4c4deaa67edfa304b44f3741e146bf6a7614751e82bfbb2debc7d37166cbcbda9b67fc10806813d9125d57412f528daf3e5060c2704cd86af0e17abe73544c68b020a3c773a870934e43653f6ba386c1fdcf7d6a7", 0x55, 0xfffffffffffffffa) r7 = request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='+\x00', 0xfffffffffffffffc) keyctl$negate(0xd, r6, 0x1f, r7) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:16:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xe000000}) [ 594.528298][ T26] audit: type=1804 audit(1574061392.717:55): pid=26386 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir853838105/syzkaller.FE9EWZ/1291/bus" dev="sda1" ino=17873 res=1 [ 594.601428][T26409] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.3'. 07:16:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x10000000}) 07:16:32 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x27a6000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:32 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x98050000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:33 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x2, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_ident={0x2, 0xa, 0x1, 0x0, 0x200000000000000}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) ptrace$setregs(0xf, 0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f000000a000/0x3000)=nil) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000780)=""/180) r1 = dup(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, 0xffffffffffffffff, 0x0, 0x4000000000dc) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$KVM_SET_CPUID2(r5, 0x4008ae90, &(0x7f0000000980)=ANY=[@ANYBLOB="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"/282]) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x40d8012) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in6=@empty, @in6=@empty}}, {{@in=@broadcast}}}, &(0x7f0000000840)=0x1e) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000400)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r6 = add_key(&(0x7f0000000180)='trusted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000280)="c4c4deaa67edfa304b44f3741e146bf6a7614751e82bfbb2debc7d37166cbcbda9b67fc10806813d9125d57412f528daf3e5060c2704cd86af0e17abe73544c68b020a3c773a870934e43653f6ba386c1fdcf7d6a7", 0x55, 0xfffffffffffffffa) r7 = request_key(&(0x7f0000000300)='cifs.idmap\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='+\x00', 0xfffffffffffffffc) keyctl$negate(0xd, r6, 0x1f, r7) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:16:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x11000000}) 07:16:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, 0x0, 0x0) sendfile(r4, r5, 0x0, 0xffe4) 07:16:33 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2827000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x12000000}) 07:16:33 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x98b80000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 595.287473][ T26] audit: type=1804 audit(1574061393.477:56): pid=26409 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir853838105/syzkaller.FE9EWZ/1291/bus" dev="sda1" ino=17873 res=1 [ 595.311545][ T26] audit: type=1804 audit(1574061393.477:57): pid=26545 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir853838105/syzkaller.FE9EWZ/1291/bus" dev="sda1" ino=17873 res=1 07:16:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2cc900ff0100a08a7a410000000000000a880000", @ANYRES32=0x0, @ANYBLOB="14000100fe880000000000000000000000000001"], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000040)=0x1, 0x4) 07:16:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x7291ea57fc7d72bc) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x2, 0x0) ioctl$int_in(r2, 0x800000c0045005, &(0x7f0000003ff8)) close(r2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040), 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000080)=""/22) 07:16:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x25000000}) 07:16:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000008feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000012d6404000000000025040400010000000704000001000000b7050000000000006a0a08fe000000008500000009000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x288800, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000001c0), 0x2) 07:16:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x40000000}) 07:16:33 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x28da000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:33 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x9f680000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:33 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f00000000c0)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000340)='vegas\x00', 0x284) r3 = socket$inet(0x2, 0x4000000805, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) bind$rose(r4, &(0x7f0000000240)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @bcast]}, 0x40) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r3, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r6, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) 07:16:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, 0x0, 0x0) sendfile(r4, r5, 0x0, 0xffe4) 07:16:34 executing program 3: open(0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x20000, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x50000) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x9}, 0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:16:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x5c000000}) 07:16:34 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa09c0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:34 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2b00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:34 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f00000000c0)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000340)='vegas\x00', 0x284) r3 = socket$inet(0x2, 0x4000000805, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) bind$rose(r4, &(0x7f0000000240)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @bcast]}, 0x40) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r3, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r6, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) 07:16:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xe7ffffff}) 07:16:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x0, 0x2, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000200)) r1 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) lstat(&(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000380)) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x4, 0x1}, {0x8, 0xd7a8}, {0x20, 0xff}, {0x5, 0x4}, {0x0, 0x8228}]}) fcntl$lock(r1, 0x0, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x2, 0x2) ioctl$IMGETVERSION(r7, 0x80044942, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fe) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8000, 0x0) readahead(r8, 0x40007, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) unshare(0x40000000) 07:16:34 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2c00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:34 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa74c0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xfdfdffff}) 07:16:34 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f00000000c0)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000340)='vegas\x00', 0x284) r3 = socket$inet(0x2, 0x4000000805, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000200)=0x80) bind$rose(r4, &(0x7f0000000240)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @bcast]}, 0x40) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r3, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r6, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) [ 596.646352][T27373] IPVS: ftp: loaded support on port[0] = 21 07:16:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r5, 0x0, 0xffe4) 07:16:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xfffffdfd}) 07:16:35 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa8800000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:35 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2f8a000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x117}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r8, 0x9}, 0x8) read$char_usb(r4, &(0x7f0000000000)=""/177, 0xb1) ptrace$cont(0x7, r0, 0x0, 0x0) [ 597.056884][T27518] sctp: [Deprecated]: syz-executor.3 (pid 27518) Use of struct sctp_assoc_value in delayed_ack socket option. [ 597.056884][T27518] Use struct sctp_sack_info instead [ 597.077152][T27519] IPVS: ftp: loaded support on port[0] = 21 07:16:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x0, 0x2, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000200)) r1 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) lstat(&(0x7f00000000c0)='./file0/bus\x00', &(0x7f0000000380)) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x4, 0x1}, {0x8, 0xd7a8}, {0x20, 0xff}, {0x5, 0x4}, {0x0, 0x8228}]}) fcntl$lock(r1, 0x0, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x2, 0x2) ioctl$IMGETVERSION(r7, 0x80044942, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fe) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8000, 0x0) readahead(r8, 0x40007, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) unshare(0x40000000) 07:16:35 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1418c2, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x38, r4, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x8001}, 0x804d0bc) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="ea"], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) 07:16:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xffffffe7}) 07:16:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0xffffffff}) 07:16:35 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x300b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:35 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xaf300000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 597.467374][T27573] IPVS: ftp: loaded support on port[0] = 21 07:16:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500"}) 07:16:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r5, 0x0, 0xffe4) 07:16:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r2, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000000c0)={'team0\x00'}) socket$inet(0x2, 0x2000080001, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000000), 0x4) accept4(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000080)=0x80, 0x80000) setsockopt$nfc_llcp_NFC_LLCP_RW(r4, 0x118, 0x0, &(0x7f0000000240)=0x62, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$inet(0x2, 0x2000080001, 0x0) setsockopt$SO_TIMESTAMP(r5, 0x1, 0x40, &(0x7f0000000000), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@loopback, @in6=@initdev}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) r6 = socket$inet(0x2, 0x2000080001, 0x0) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f0000000000), 0x4) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="a7724bdef6abf9d1a51c4bfce1e7755100"/26], 0x1a) sendfile(r1, r1, &(0x7f0000000000)=0x10000000, 0x8080fffffffe) 07:16:36 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x30be000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x2}) 07:16:36 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xafe30000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:36 executing program 3: [ 597.984236][ C1] net_ratelimit: 20 callbacks suppressed [ 597.984249][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 597.995805][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 598.001571][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.007349][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 598.013112][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.018877][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x3}) 07:16:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001840)={'vcan0\x00', 0x0}) r2 = socket$can_j1939(0x1d, 0x2, 0x7) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r3, r4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000000)={'vxcan0\x00', r1}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000001840)={'vcan0\x00', 0x0}) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$TUNSETVNETLE(r9, 0x400454dc, &(0x7f0000000040)) bind$can_j1939(r2, &(0x7f0000000240)={0x1d, r6}, 0x18) connect$can_j1939(r2, &(0x7f0000000180)={0x1d, r1}, 0x18) writev(r2, &(0x7f0000000140)=[{0x0, 0x2}, {&(0x7f00000001c0)='T', 0x1}], 0x2) [ 598.224176][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.230036][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x4}) 07:16:36 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x101000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x84a01550}, 0xc, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB="94000000a2976fb102fd04488b25293c0998902ac1276f6ea8c268ea0e080f373752fb1b9f5673ddf478ad3ed129ee9cff3b86c0641c136fbfea2f268025da21c3d600222e80b412c0b53144d750e13e62d43cc13174926390a80ced1232577c96503c54e5", @ANYRES16=r4, @ANYBLOB="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"], 0x94}}, 0x4000080) semget(0x1, 0x6, 0x40) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x2, &(0x7f0000000000), 0x5, 0xffffffffffffffff, 0x8}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80080, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r5, 0x0, 0x1, &(0x7f0000000100)=0xfffff459, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10008, 0xf) 07:16:36 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3300000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:36 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb0640000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 598.464141][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.469995][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r5, 0x0, 0xffe4) 07:16:37 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) mknodat(r0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x3ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000000)=0xffff, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x9}, 0x8) write$cgroup_subtree(r6, &(0x7f00000000c0)={[{0x86fd2d1c3cdfc07f, 'pids'}, {0x2d, 'memory'}, {0x2b, 'io'}]}, 0x12) r11 = open(&(0x7f0000000080)='./file0\x00', 0x121040, 0x14a) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r12 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x0) write$9p(r11, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r11, r12, 0x0, 0x10000) r13 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r13) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000200)=ANY=[@ANYBLOB="3e41d0c5"]) 07:16:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x5}) 07:16:37 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x376e000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:37 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x9, 0x1, 0x9, 0x5}) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)='.', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0xfd5c}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002e00)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb3532da1f23a262055223e7a3a62f15eeb8060dc9cfa30e6783757ae2f0ac6ed75d3212591ccd", 0x27d}], 0x1, 0x0, 0x0, 0x1000000}, 0x20044c00) 07:16:37 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb7140000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x6}) 07:16:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@loopback, @remote, @mcast1, 0x0, 0x401}) fallocate(0xffffffffffffffff, 0x18, 0x5e7, 0x924) 07:16:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x480, 0x0) connect$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x1, 0x0, 0xd36a892c83f50abd, 0xa7, 0x4, "04ef8246661de475e1f4a4fab34a119d251419689668b94ef34fd463025bd944e7cb19f49ecec1919580919050742fecedf215f596178af0d0f34c923e6d6a", 0x20}, 0x60) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'vet\x00\x00\x00_b\x1f\x1cC\xa5e\x00', 0x0}) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r5 = socket(0x200000100000011, 0x803, 0x0) bind$packet(r5, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) bind$xdp(r4, &(0x7f0000000900)={0x2c, 0x0, r6}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@newlink={0xc4, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xa4, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x94, 0x2, [@IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_ENCAP_LIMIT={0x8, 0x6, 0x9}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0xffffffff}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x2ab1}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e21}, @IFLA_IPTUN_TOS={0x8, 0x5, 0xfe}, @IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x3}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e20}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_LINK={0x8, 0x2, r6}], @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x3a}]]}}}]}, 0xc4}}, 0x0) 07:16:37 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x38a2000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:37 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb7c70000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x7}) [ 599.331651][T28587] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 599.344793][T28587] netlink: 'syz-executor.3': attribute type 6 has an invalid length. [ 599.382915][T28587] netlink: 'syz-executor.3': attribute type 17 has an invalid length. [ 599.399255][T28587] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 599.425267][T28587] netlink: 'syz-executor.3': attribute type 18 has an invalid length. [ 599.543369][T28587] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 599.553083][T28587] netlink: 'syz-executor.3': attribute type 6 has an invalid length. [ 599.561273][T28587] netlink: 'syz-executor.3': attribute type 17 has an invalid length. [ 599.574327][T28587] netlink: 'syz-executor.3': attribute type 15 has an invalid length. [ 599.582600][T28587] netlink: 'syz-executor.3': attribute type 18 has an invalid length. 07:16:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, 0xffffffffffffffff, 0x0, 0xffe4) 07:16:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x8}) 07:16:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r1, 0x9}, 0x8) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000440)={r1, 0xfc}, &(0x7f0000000480)=0x8) symlinkat(&(0x7f00000004c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00') sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2010008}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipv6_getrule={0x20, 0x22, 0x8, 0x70bd2c, 0x25dfdbfe, {0xa, 0x80, 0x4, 0x7f, 0xc0, 0x0, 0x0, 0x8, 0x28}, ["", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x197761c0d899dd02}, 0x1) socket$can_j1939(0x1d, 0x2, 0x7) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001500)=ANY=[]}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYBLOB="dde9a61edfc51d052b0c815cf29f15f81ac43920fb4dc13e15756ff5dd82a6a5d402cabb82d9ad499dcb8f96188a05c28f285a116f487a7b1799b58b"], 0x2}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x600084}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_newaddr={0x20, 0x14, 0x100, 0x70bd28, 0x25dfdbfb, {0x2, 0x18, 0x240, 0xc8, r7}, [@IFA_FLAGS={0x8, 0x8, 0x21}]}, 0x20}, 0x1, 0x0, 0x0, 0x44}, 0x1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000280)) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x3, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) r10 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r10, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) write$binfmt_elf32(r10, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x81, 0x1f, 0x6, 0x9, 0x2, 0x6, 0x80000000, 0x28b, 0x38, 0xe9, 0x4, 0x8000, 0x20, 0x1, 0x7f, 0x0, 0x6}, [{0x48000005, 0x8, 0xa4aa, 0x20, 0x800, 0x80000001, 0x1, 0x2}, {0x28000004, 0xc, 0x7fff, 0x1, 0x80000000, 0x81, 0x5}], "e2af64bc010cc263cb5854c7e094224d1adc34cb1e10c656c6548ca65b6c12b85844b8f4ae8cfe80a392398a1c5378d92106bc338c0d2c4eae72d36b9d22d60327f72f3c95c484be38bb61ca352d4e900813f6c1590c0deb61a50b3b415a25949030b2f2b6dbdceee8971165df2b0a83e8c71d7e925fdc5019d853090117f6044ef19d82853286286afcb18e0a20831e4e45a6ee35d104766d5189222cc4befd63b0e983a62d04986c98f323c24cee19b253df68f1f75c94e65177aef111d07e45ed04d0cb2f03398bcc249c9f9168a87eee6a2e342c4831de46c84706f6", [[], [], [], [], []]}, 0x656) ioctl$PPPIOCGNPMODE(r9, 0xc008744c, 0x0) 07:16:38 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3b00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:38 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb8480000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@swalloc='swalloc'}], [{@fsmagic={'fsmagic', 0x3d, 0x7e7}}, {@smackfsfloor={'smackfsfloor'}}, {@pcr={'pcr', 0x3d, 0x8}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x5a7847ced19f9641, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x6, @bearer=@l2={'ib', 0x3a, 'hwsim0\x00'}}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x40000) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x181}, "5f243a57178f4a63", "48514fd0247a22136748c6ff905a2563", "b2e07204", "5b103d1339482c01"}, 0x28) 07:16:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x9}) 07:16:38 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3c00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:38 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb8fb0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xa}) 07:16:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xb}) 07:16:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) accept$packet(r0, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x14103e, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x800}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a002000000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638477fbac141412e0000001c699da153f08a0e6e380f60108f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = socket$inet(0x2, 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x9}, 0x8) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000180)=r0, 0x1) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$IOC_PR_RESERVE(r5, 0x401070c9, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, &(0x7f0000000100)=0x2, 0x4) 07:16:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, 0xffffffffffffffff, 0x0, 0xffe4) 07:16:39 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3d00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xbfab0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xc}) 07:16:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xd}) 07:16:39 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3f00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc02c0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xe}) 07:16:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x10}) 07:16:39 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3f52000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc0df0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001780)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0xfffd}]]}}}]}, 0x40}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000180)={@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x0, 0x3}}, {&(0x7f0000000080)=""/178, 0xb2}, &(0x7f0000000140), 0x20}, 0xa0) 07:16:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x11}) 07:16:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, 0xffffffffffffffff, 0x0, 0xffe4) 07:16:40 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:40 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc78f0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x12}) 07:16:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x25}) 07:16:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x9918) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7a3, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") dup3(r0, r2, 0x0) tkill(r1, 0x1002000000016) 07:16:40 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4086000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x5c}) 07:16:40 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc8050000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xe7}) 07:16:40 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x3, 0x8) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2400000002031f001cfffd946fa2830020200a800900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100401d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0xb, 0x44031, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={r3, 0x7}, &(0x7f0000000040)=0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') 07:16:40 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc8100000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 602.628230][T29983] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 07:16:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0x0) 07:16:41 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4736000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x300}) 07:16:41 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r2, 0x900, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}]}]}, 0x60}}, 0x4) bind$packet(r0, &(0x7f0000000000)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file1', [], 0xa, "df9872"}, 0xe) 07:16:41 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc8c30000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x500}) 07:16:41 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x47e9000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x80) setsockopt$inet6_udp_int(r1, 0x11, 0x74c35607bc4978d0, &(0x7f00000000c0)=0x7, 0x4) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@loopback}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 07:16:41 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xcf730000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x600}) 07:16:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x700}) 07:16:41 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0x0) 07:16:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd0a70000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x900}) 07:16:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x10029, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r0, r1) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x8000) ioctl$KVM_NMI(r3, 0xae9a) sysfs$3(0x3) syz_open_dev$sndseq(0x0, 0x0, 0x4000) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/3\xca\x98i/capi20ncci\x00', 0x80, 0x0) chroot(&(0x7f0000000140)='./bus\x00') sched_setaffinity(0x0, 0x316, &(0x7f0000000340)=0xa000000000000005) clone(0x0, 0x0, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x48280) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000100)=""/42) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r5, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000080)={0x3, 0x2878, 0x3ff, 0x1, 0x2, 0x6}) 07:16:42 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x486a000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xa00}) 07:16:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd7570000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:42 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4c00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:42 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x100, 0x101000) shutdown(r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20}, {0x0, 0x10000000000}}, {{@in6=@mcast1, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x3}}, 0xe8) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0xbe30, 0x2}]}, 0xc, 0x2) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$unix(0x1, 0x2, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f00000002c0)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x1, @remote}, 0x44, {0x2, 0x4e21, @rand_addr=0x36b}, 'nr0\x00'}) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0xfffffd39, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000002a002d2800000000000000000700100010000800"], 0x24}}, 0x0) [ 604.224135][ C1] net_ratelimit: 20 callbacks suppressed [ 604.224141][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.235636][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 604.241424][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.247222][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 604.253036][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.258848][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xb00}) 07:16:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd8040000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xc00}) [ 604.464192][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 604.470057][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 604.704184][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 604.710094][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0x0) 07:16:42 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4f1a000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:42 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r4, 0x9}, 0x8) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x761, 0x209, 0x8000, 0x2, r6}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r7, 0x4}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f00000008c0)=ANY=[@ANYBLOB="010000000000000000000000000000008500000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/133], @ANYBLOB="000000b1d2634936"]) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r9, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r9, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r9, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8916, &(0x7f00000002c0)={'bridge0\x00', {0x2, 0x4e23, @broadcast}}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000200)={{0x5, 0x28, 0x3f, 0x9, 0xa4, 0x7f}, 0x4ab5e7c5, 0x8001, 0x3f, 0x1, 0x3f, "77f8d11ac23593eab42bf7cf30c0df73a7730bbebadff8b31acc12c0986f5731b48e5b33d504a088b140f6f487ccf28c0d000885eb80c73e70b916e6cc41cc225d4da4d32ddff95939ca75ad7083e35e0ca17ed7e6970e5f810d6a96a7747715ecfd4fb5fe3e4be5e5328a394672a8de6be3fd87e2b5a265ad563de9a48c4b7a"}) sendmmsg(r8, &(0x7f0000000480), 0x2e9, 0x0) 07:16:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xd00}) 07:16:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd88b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xe00}) 07:16:43 executing program 4: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001740)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf200000000000001500000008ffffffbd0301000000000095000000000000006916000000000000bf67000000000000170600000fff07006706000002000000070600000ee60000bf150000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27df8ecf264e0f84f9f17d3c30e3c72fe9755ba08508460b603daf5a7d1dbdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a674f888a08034b7dd4a9703d6c4f633a9a4f16d0a3e1282ee45a010fb94fe9de56c9daa814261bdb94a6538b89dc6c60bf70d742a81b72bab8395fa64810b5b"], &(0x7f0000000100)='GPL\x00'}, 0x48) pipe2(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) r4 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x20000000000000a, 0x2, 0x0) accept4$llc(r3, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000240)=0x10, 0x40800) getsockopt$sock_buf(r5, 0x1, 0x2f, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x1d5) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r9, 0x9}, 0x8) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', 'GPL\x00'}, &(0x7f0000000180)='bdev\x00', 0x5, 0xb37368dc0f4a8d3) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000040)=0x9) 07:16:43 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xdf3b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:43 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4fcd000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x1100}) 07:16:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x1200}) 07:16:43 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xdfee0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:43 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe06f0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:43 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x504e000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:43 executing program 1 (fault-call:15 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:43 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x1) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) sendmsg$rds(r0, &(0x7f0000001380)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@fadd={0x58, 0x114, 0x6, {{}, &(0x7f0000000180), 0x0}}, @cswp={0x58, 0x114, 0x7, {{}, 0x0, 0x0}}], 0xb0}, 0x0) 07:16:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x2500}) 07:16:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x4000}) 07:16:44 executing program 4: socket$key(0xf, 0x3, 0x2) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000005c0)=ANY=[@ANYRES32=r5, @ANYBLOB="920000005d39a32279cf7cee24dfd02eed721026d9c6d88f21d85374af9c8f62d5813c3d89568e609bf4ff392be98b3e4098e7bcf4b69695ddfbd181e5567b3c62a71518e08bf4f44686cff0e932d66eef3f7ae9380ce6e6d4ee264eb1133a7762d61ed3ca23969f10e66e1be818eafc4663cc1c600ccf9cdd021d0e99cb4df8648b3c7f352daa8804d675780327b687fbb8692ec30068f68e14ba4d670c80384ce4ed98bb8b7269e455d4"], &(0x7f0000000040)=0x9a) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000080)={r6, 0xfff}, 0x8) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x100005) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:16:44 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe0ffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 605.987575][T31839] FAULT_INJECTION: forcing a failure. [ 605.987575][T31839] name failslab, interval 1, probability 0, space 0, times 0 [ 606.000358][T31839] CPU: 0 PID: 31839 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 606.008256][T31839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.008262][T31839] Call Trace: [ 606.008279][T31839] dump_stack+0x1fb/0x318 [ 606.008294][T31839] should_fail+0x555/0x770 [ 606.008310][T31839] __should_failslab+0x11a/0x160 [ 606.035305][T31839] should_failslab+0x9/0x20 [ 606.039804][T31839] kmem_cache_alloc_trace+0x5d/0x2f0 [ 606.039813][T31839] ? alloc_pipe_info+0xae/0x3f0 [ 606.039826][T31839] alloc_pipe_info+0xae/0x3f0 [ 606.039843][T31839] splice_direct_to_actor+0x910/0xac0 [ 606.059990][T31839] ? do_splice_direct+0x330/0x330 [ 606.065016][T31839] ? rcu_lock_release+0xd/0x30 [ 606.069785][T31839] ? security_file_permission+0x148/0x350 [ 606.075511][T31839] ? rw_verify_area+0x1c2/0x360 [ 606.080364][T31839] do_splice_direct+0x200/0x330 [ 606.085220][T31839] ? security_file_permission+0x90/0x350 [ 606.090842][T31839] do_sendfile+0x7e4/0xfd0 [ 606.095271][T31839] __x64_sys_sendfile64+0x176/0x1b0 [ 606.100476][T31839] do_syscall_64+0xf7/0x1c0 [ 606.104987][T31839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 606.110874][T31839] RIP: 0033:0x45a639 [ 606.114765][T31839] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:16:44 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x57b1000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 606.134364][T31839] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 606.134374][T31839] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 606.134380][T31839] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 606.134386][T31839] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 606.134392][T31839] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 606.134398][T31839] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x5c00}) 07:16:44 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe71f0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c0000001400210100000000000010000a000000", @ANYRES32=r1, @ANYBLOB="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"], 0x5c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KVM_GET_TSC_KHZ(r5, 0xaea3) r6 = socket(0x10, 0x200080002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100), 0x2}], 0x492492492492805, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x3, 0x2, 0x8, 0x6}, {0xddd1, 0x1f, 0x3f, 0x3}, {0xe0, 0x83, 0x3f, 0x8}, {0x0, 0x0, 0x25, 0x1ff}, {0x100, 0x1, 0x7, 0xe87a949}, {0x4, 0x8, 0x7f, 0x2}, {0x1, 0x7, 0xff, 0x93}, {0x95a, 0x9, 0x2, 0x10001}]}, 0x10) 07:16:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xe7ff}) 07:16:44 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5832000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:44 executing program 1 (fault-call:15 fault-nth:1): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd38, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYRESDEC=r0], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x1) socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000180)=@generic={0x5, "00000100120000008800440564c0681a4976e236005404b0e0301a4ce84243e3ff5f163ee340b767950080775027ecce66f5792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000ddff00000006ad8e83657e6f3a0fffc2c65400eaff00000000000000000b00000000000000000000000000dcf46d8ff1ff"}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, 0x0) 07:16:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xfdfd}) 07:16:44 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe7d20000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:44 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x58e5000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xffe7}) [ 606.914776][T32477] FAULT_INJECTION: forcing a failure. [ 606.914776][T32477] name failslab, interval 1, probability 0, space 0, times 0 [ 606.927616][T32477] CPU: 0 PID: 32477 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 606.935514][T32477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.945569][T32477] Call Trace: [ 606.948859][T32477] dump_stack+0x1fb/0x318 [ 606.953194][T32477] should_fail+0x555/0x770 [ 606.957614][T32477] __should_failslab+0x11a/0x160 [ 606.962554][T32477] ? kcalloc+0x36/0x60 [ 606.966670][T32477] should_failslab+0x9/0x20 [ 606.966682][T32477] __kmalloc+0x7a/0x340 [ 606.966698][T32477] kcalloc+0x36/0x60 [ 606.975322][T32477] alloc_pipe_info+0x1ce/0x3f0 [ 606.975337][T32477] splice_direct_to_actor+0x910/0xac0 [ 606.975346][T32477] ? do_splice_direct+0x330/0x330 [ 606.975358][T32477] ? rcu_lock_release+0xd/0x30 [ 606.975370][T32477] ? security_file_permission+0x148/0x350 [ 606.975384][T32477] ? rw_verify_area+0x1c2/0x360 [ 607.009712][T32477] do_splice_direct+0x200/0x330 [ 607.014565][T32477] ? security_file_permission+0x90/0x350 [ 607.020197][T32477] do_sendfile+0x7e4/0xfd0 [ 607.024629][T32477] __x64_sys_sendfile64+0x176/0x1b0 [ 607.029907][T32477] do_syscall_64+0xf7/0x1c0 [ 607.034404][T32477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.040288][T32477] RIP: 0033:0x45a639 [ 607.044176][T32477] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.063769][T32477] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 607.072171][T32477] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 607.080136][T32477] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 607.088099][T32477] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 607.096072][T32477] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 607.104035][T32477] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:45 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe8030000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) r8 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r3, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r8}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendto$inet6(r9, &(0x7f00000000c0)="2f8fe64b67491fd980155e8cf93bc4f1d1cfea24086747674f0c3b7e5a314e03163569e9975f9a505847dbe9d6b239f527b2a7ba5c18b87a6fd7f40ef26c9274dbf8a09a255a2a6d1df667318dfdab91c87d64cb7304a09868edd9564d0d8bdfc8bca48d20cd346861c8dfbdf19a39fdd69ed44b6e82aa2abf7c6d4e8146c95d4f09dbbd29020d037b009cfb7dfbe7ccd78794091deea9df59509fa39cd8935f211c264ae3dfceff1471b6859c8b75158af501e06cd193e093d4cf1b41db814a5a1b9f6db63c891cb14d1a2f7495178257de4947bf5df5c7fe0132ab4a94b598a897d8e544fd0d21f1ae091e08dfc87d56a609171c", 0xf5, 0x8000, &(0x7f00000001c0)={0xa, 0x4e22, 0x9, @mcast2, 0x2}, 0x1c) 07:16:45 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5f95000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x1000000}) 07:16:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x2000000}) 07:16:45 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe8530000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:45 executing program 1 (fault-call:15 fault-nth:2): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) r8 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r3, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r8}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendto$inet6(r9, &(0x7f00000000c0)="2f8fe64b67491fd980155e8cf93bc4f1d1cfea24086747674f0c3b7e5a314e03163569e9975f9a505847dbe9d6b239f527b2a7ba5c18b87a6fd7f40ef26c9274dbf8a09a255a2a6d1df667318dfdab91c87d64cb7304a09868edd9564d0d8bdfc8bca48d20cd346861c8dfbdf19a39fdd69ed44b6e82aa2abf7c6d4e8146c95d4f09dbbd29020d037b009cfb7dfbe7ccd78794091deea9df59509fa39cd8935f211c264ae3dfceff1471b6859c8b75158af501e06cd193e093d4cf1b41db814a5a1b9f6db63c891cb14d1a2f7495178257de4947bf5df5c7fe0132ab4a94b598a897d8e544fd0d21f1ae091e08dfc87d56a609171c", 0xf5, 0x8000, &(0x7f00000001c0)={0xa, 0x4e22, 0x9, @mcast2, 0x2}, 0x1c) 07:16:45 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x3000000}) [ 607.797829][ T319] FAULT_INJECTION: forcing a failure. [ 607.797829][ T319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 607.811217][ T319] CPU: 1 PID: 319 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 607.818948][ T319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.828999][ T319] Call Trace: [ 607.832295][ T319] dump_stack+0x1fb/0x318 [ 607.837581][ T319] should_fail+0x555/0x770 [ 607.842008][ T319] should_fail_alloc_page+0x55/0x60 [ 607.848421][ T319] prepare_alloc_pages+0x283/0x460 [ 607.853537][ T319] __alloc_pages_nodemask+0xb2/0x5d0 [ 607.858832][ T319] alloc_pages_vma+0x4f7/0xd50 [ 607.863600][ T319] shmem_alloc_and_acct_page+0x425/0xbb0 [ 607.869270][ T319] shmem_getpage_gfp+0x2313/0x2a90 [ 607.874406][ T319] shmem_file_read_iter+0x25c/0x9e0 [ 607.879602][ T319] ? fsnotify+0x1318/0x13d0 [ 607.884103][ T319] generic_file_splice_read+0x504/0x820 [ 607.889649][ T319] ? splice_shrink_spd+0xb0/0xb0 [ 607.894579][ T319] splice_direct_to_actor+0x39c/0xac0 [ 607.899942][ T319] ? do_splice_direct+0x330/0x330 [ 607.904969][ T319] do_splice_direct+0x200/0x330 [ 607.909821][ T319] ? security_file_permission+0x90/0x350 [ 607.915448][ T319] do_sendfile+0x7e4/0xfd0 [ 607.919871][ T319] __x64_sys_sendfile64+0x176/0x1b0 [ 607.925073][ T319] do_syscall_64+0xf7/0x1c0 [ 607.929577][ T319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.935462][ T319] RIP: 0033:0x45a639 [ 607.939350][ T319] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.958949][ T319] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 607.967363][ T319] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 607.975333][ T319] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 607.983388][ T319] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 07:16:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) r8 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r3, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r8}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendto$inet6(r9, &(0x7f00000000c0)="2f8fe64b67491fd980155e8cf93bc4f1d1cfea24086747674f0c3b7e5a314e03163569e9975f9a505847dbe9d6b239f527b2a7ba5c18b87a6fd7f40ef26c9274dbf8a09a255a2a6d1df667318dfdab91c87d64cb7304a09868edd9564d0d8bdfc8bca48d20cd346861c8dfbdf19a39fdd69ed44b6e82aa2abf7c6d4e8146c95d4f09dbbd29020d037b009cfb7dfbe7ccd78794091deea9df59509fa39cd8935f211c264ae3dfceff1471b6859c8b75158af501e06cd193e093d4cf1b41db814a5a1b9f6db63c891cb14d1a2f7495178257de4947bf5df5c7fe0132ab4a94b598a897d8e544fd0d21f1ae091e08dfc87d56a609171c", 0xf5, 0x8000, &(0x7f00000001c0)={0xa, 0x4e22, 0x9, @mcast2, 0x2}, 0x1c) [ 607.991354][ T319] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 607.999325][ T319] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x4000000}) 07:16:46 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xef030000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:46 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6016000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x5000000}) 07:16:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) r8 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r3, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r8}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendto$inet6(r9, &(0x7f00000000c0)="2f8fe64b67491fd980155e8cf93bc4f1d1cfea24086747674f0c3b7e5a314e03163569e9975f9a505847dbe9d6b239f527b2a7ba5c18b87a6fd7f40ef26c9274dbf8a09a255a2a6d1df667318dfdab91c87d64cb7304a09868edd9564d0d8bdfc8bca48d20cd346861c8dfbdf19a39fdd69ed44b6e82aa2abf7c6d4e8146c95d4f09dbbd29020d037b009cfb7dfbe7ccd78794091deea9df59509fa39cd8935f211c264ae3dfceff1471b6859c8b75158af501e06cd193e093d4cf1b41db814a5a1b9f6db63c891cb14d1a2f7495178257de4947bf5df5c7fe0132ab4a94b598a897d8e544fd0d21f1ae091e08dfc87d56a609171c", 0xf5, 0x8000, &(0x7f00000001c0)={0xa, 0x4e22, 0x9, @mcast2, 0x2}, 0x1c) 07:16:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x6000000}) 07:16:46 executing program 1 (fault-call:15 fault-nth:3): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:46 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x60c9000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:46 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xefb60000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x7000000}) 07:16:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) r8 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r3, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r8}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)) [ 608.730384][ T494] FAULT_INJECTION: forcing a failure. [ 608.730384][ T494] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 608.743794][ T494] CPU: 1 PID: 494 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 608.751525][ T494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.761575][ T494] Call Trace: [ 608.764864][ T494] dump_stack+0x1fb/0x318 [ 608.769203][ T494] should_fail+0x555/0x770 [ 608.773626][ T494] should_fail_alloc_page+0x55/0x60 [ 608.778824][ T494] prepare_alloc_pages+0x283/0x460 [ 608.783942][ T494] __alloc_pages_nodemask+0xb2/0x5d0 [ 608.789247][ T494] alloc_pages_vma+0x4f7/0xd50 [ 608.794016][ T494] shmem_alloc_and_acct_page+0x425/0xbb0 [ 608.799666][ T494] shmem_getpage_gfp+0x2313/0x2a90 [ 608.804807][ T494] shmem_file_read_iter+0x25c/0x9e0 [ 608.810007][ T494] generic_file_splice_read+0x504/0x820 [ 608.815552][ T494] ? splice_shrink_spd+0xb0/0xb0 [ 608.820487][ T494] splice_direct_to_actor+0x39c/0xac0 [ 608.825851][ T494] ? do_splice_direct+0x330/0x330 [ 608.830879][ T494] do_splice_direct+0x200/0x330 [ 608.835727][ T494] ? security_file_permission+0x90/0x350 [ 608.841356][ T494] do_sendfile+0x7e4/0xfd0 [ 608.845788][ T494] __x64_sys_sendfile64+0x176/0x1b0 [ 608.850986][ T494] do_syscall_64+0xf7/0x1c0 [ 608.855489][ T494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.861373][ T494] RIP: 0033:0x45a639 07:16:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x8000000}) [ 608.865264][ T494] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 608.884861][ T494] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 608.893264][ T494] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 608.901231][ T494] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 608.909214][ T494] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 608.917180][ T494] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 07:16:47 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6400000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 608.925154][ T494] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r2, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r7}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x9000000}) 07:16:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf0370000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xa000000}) 07:16:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r2, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r7}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:47 executing program 1 (fault-call:15 fault-nth:4): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:47 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6779000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf0ea0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r2, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r7}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xb000000}) 07:16:47 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 609.723718][ T823] FAULT_INJECTION: forcing a failure. [ 609.723718][ T823] name failslab, interval 1, probability 0, space 0, times 0 [ 609.736698][ T823] CPU: 1 PID: 823 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 609.744413][ T823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.754488][ T823] Call Trace: [ 609.757784][ T823] dump_stack+0x1fb/0x318 [ 609.762122][ T823] should_fail+0x555/0x770 [ 609.766544][ T823] __should_failslab+0x11a/0x160 [ 609.771481][ T823] ? xas_create+0x6f3/0x1910 [ 609.776072][ T823] should_failslab+0x9/0x20 [ 609.780573][ T823] kmem_cache_alloc+0x56/0x2e0 [ 609.785338][ T823] xas_create+0x6f3/0x1910 [ 609.789765][ T823] xas_create_range+0x142/0x700 [ 609.795233][ T823] shmem_add_to_page_cache+0x91e/0x1290 [ 609.800789][ T823] shmem_getpage_gfp+0x121e/0x2a90 [ 609.805921][ T823] shmem_file_read_iter+0x25c/0x9e0 [ 609.811127][ T823] generic_file_splice_read+0x504/0x820 [ 609.817978][ T823] ? splice_shrink_spd+0xb0/0xb0 07:16:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r2, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r7}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 609.822916][ T823] splice_direct_to_actor+0x39c/0xac0 [ 609.828278][ T823] ? do_splice_direct+0x330/0x330 [ 609.833311][ T823] do_splice_direct+0x200/0x330 [ 609.838161][ T823] ? security_file_permission+0x90/0x350 [ 609.843791][ T823] do_sendfile+0x7e4/0xfd0 [ 609.848220][ T823] __x64_sys_sendfile64+0x176/0x1b0 [ 609.853422][ T823] do_syscall_64+0xf7/0x1c0 [ 609.857929][ T823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.863817][ T823] RIP: 0033:0x45a639 07:16:48 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf4010000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 609.867710][ T823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.887402][ T823] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 609.895859][ T823] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 609.903826][ T823] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 609.911793][ T823] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 07:16:48 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x68ad000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xc000000}) [ 609.919762][ T823] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 609.927730][ T823] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 [ 609.937060][ C1] net_ratelimit: 21 callbacks suppressed [ 609.937069][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:16:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r2, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r7}]) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xd000000}) 07:16:48 executing program 1 (fault-call:15 fault-nth:5): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:48 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf5ffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xe000000}) 07:16:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r2, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r7}]) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:48 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6c00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x10000000}) [ 610.464175][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 610.469996][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 610.475841][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 610.481581][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 610.487401][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 610.493171][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r2, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r7}]) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:48 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf79a0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:48 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6f5d000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x11000000}) [ 610.704198][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 610.710008][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 610.717811][ T1097] FAULT_INJECTION: forcing a failure. [ 610.717811][ T1097] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 610.731178][ T1097] CPU: 1 PID: 1097 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 610.739005][ T1097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.749060][ T1097] Call Trace: [ 610.752354][ T1097] dump_stack+0x1fb/0x318 [ 610.756694][ T1097] should_fail+0x555/0x770 [ 610.761125][ T1097] should_fail_alloc_page+0x55/0x60 [ 610.766318][ T1097] prepare_alloc_pages+0x283/0x460 [ 610.766334][ T1097] __alloc_pages_nodemask+0xb2/0x5d0 [ 610.766356][ T1097] alloc_pages_vma+0x4f7/0xd50 [ 610.766374][ T1097] shmem_alloc_and_acct_page+0x425/0xbb0 [ 610.766401][ T1097] shmem_getpage_gfp+0x2313/0x2a90 [ 610.776776][ T1097] shmem_file_read_iter+0x25c/0x9e0 [ 610.776806][ T1097] generic_file_splice_read+0x504/0x820 [ 610.776824][ T1097] ? splice_shrink_spd+0xb0/0xb0 [ 610.776835][ T1097] splice_direct_to_actor+0x39c/0xac0 [ 610.776843][ T1097] ? do_splice_direct+0x330/0x330 [ 610.776864][ T1097] do_splice_direct+0x200/0x330 [ 610.776883][ T1097] ? security_file_permission+0x90/0x350 [ 610.776896][ T1097] do_sendfile+0x7e4/0xfd0 [ 610.776922][ T1097] __x64_sys_sendfile64+0x176/0x1b0 [ 610.838291][ T1097] do_syscall_64+0xf7/0x1c0 [ 610.842777][ T1097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.848647][ T1097] RIP: 0033:0x45a639 [ 610.852518][ T1097] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.872107][ T1097] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 610.880492][ T1097] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 610.888440][ T1097] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 610.896389][ T1097] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 610.904337][ T1097] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 610.912284][ T1097] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 [ 610.921385][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:16:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) io_submit(r1, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x25, r2, &(0x7f0000000280)="d655", 0x2, 0x0, 0x0, 0x1, r7}]) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x12000000}) 07:16:49 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf81b0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:49 executing program 1 (fault-call:15 fault-nth:6): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:49 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7091000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x25000000}) 07:16:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x4f, 0x200100) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x2}) socket$unix(0x1, 0x7, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x306) syz_open_dev$video(&(0x7f0000001900)='/dev/video#\x00', 0x7fff, 0xcb3d019e21f987fb) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f00000001c0)={0x4, @win={{0x101, 0x7, 0x5}, 0xd, 0x8001, &(0x7f0000000040)={{0x6, 0x9, 0x7, 0x5}}, 0x1f, &(0x7f0000000080)="4b177a062b5db29372b3ba028ebbb62f2f6f5d96c42cef41ac13cfcf1fd9f766648eb4cf25d4ddbfabe8b242e6d0af7987d555788e57fb2fe7aa2e19b056f32dc88ea428c5b21fd2b848b72808f5afa79c21d15c3eff415bb70fc3a6c79ee20a214e32223bb45815c6adeda3719662effd66d89df23229f9c5a32b7fc41a3b46d95cf1246ef7d16b975cf9d523635dfa7f54066a74353867e72ca5b0fd68e6f4350afb3465accd8bb4a1d339ac65fc53d52df34d0b2bc540399d41a680fd5d90d4eb046f5abfae1c15af6606a865aa045f4628ce00000000", 0x81}}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000002c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000001740)={0x7, &(0x7f0000000340)=""/59, &(0x7f0000001680)=[{0x82, 0xf0, 0x3, &(0x7f0000000380)=""/240}, {0xffff991c, 0x4f, 0x80, &(0x7f0000000480)=""/79}, {0x1, 0x56, 0xfff, &(0x7f0000000500)=""/86}, {0x3, 0x1000, 0x101, &(0x7f0000000580)=""/4096}, {0x36ae, 0x7, 0x7ff, &(0x7f0000001580)=""/7}, {0x0, 0x4e, 0x40, &(0x7f00000015c0)=""/78}, {0x100, 0x9, 0x6, &(0x7f0000001640)=""/9}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r11, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r11, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r12, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="010440", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x66, &(0x7f0000000040)={r13}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r11, 0x84, 0x76, &(0x7f0000001880)={r13, 0xffff}, &(0x7f00000018c0)=0x8) r14 = socket$inet_sctp(0x2, 0x5, 0x84) r15 = dup3(r8, r14, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r15, 0x84, 0x6b, 0x0, 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r17 = socket$inet(0x2, 0x4000000805, 0x0) r18 = socket$inet_sctp(0x2, 0x5, 0x84) r19 = dup3(r17, r18, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r19, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r19, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r16, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r20, 0x9}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r16, 0x84, 0xa, &(0x7f0000000100)={0x7, 0x0, 0x0, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r21, 0x9}, 0x8) r22 = openat(r7, &(0x7f0000001780)='./file0\x00', 0x8000, 0x80) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r22, 0x84, 0x13, &(0x7f00000017c0)=0xfffffc01, 0x4) close(r0) getsockname$netlink(r14, &(0x7f0000001800), &(0x7f0000001840)=0xc) 07:16:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x40000000}) 07:16:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 611.610815][ T1345] FAULT_INJECTION: forcing a failure. [ 611.610815][ T1345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 611.624237][ T1345] CPU: 0 PID: 1345 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 611.632047][ T1345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.642099][ T1345] Call Trace: [ 611.645389][ T1345] dump_stack+0x1fb/0x318 [ 611.649730][ T1345] should_fail+0x555/0x770 [ 611.654153][ T1345] should_fail_alloc_page+0x55/0x60 [ 611.659353][ T1345] prepare_alloc_pages+0x283/0x460 [ 611.664467][ T1345] __alloc_pages_nodemask+0xb2/0x5d0 [ 611.669763][ T1345] alloc_pages_vma+0x4f7/0xd50 [ 611.674534][ T1345] shmem_alloc_and_acct_page+0x425/0xbb0 [ 611.680190][ T1345] shmem_getpage_gfp+0x2313/0x2a90 [ 611.685323][ T1345] shmem_file_read_iter+0x25c/0x9e0 [ 611.690531][ T1345] generic_file_splice_read+0x504/0x820 [ 611.696087][ T1345] ? splice_shrink_spd+0xb0/0xb0 [ 611.701020][ T1345] splice_direct_to_actor+0x39c/0xac0 [ 611.706383][ T1345] ? do_splice_direct+0x330/0x330 [ 611.711414][ T1345] do_splice_direct+0x200/0x330 [ 611.716271][ T1345] ? security_file_permission+0x90/0x350 [ 611.721903][ T1345] do_sendfile+0x7e4/0xfd0 [ 611.726333][ T1345] __x64_sys_sendfile64+0x176/0x1b0 [ 611.731531][ T1345] do_syscall_64+0xf7/0x1c0 [ 611.736036][ T1345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.741921][ T1345] RIP: 0033:0x45a639 [ 611.745813][ T1345] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 611.765420][ T1345] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 611.773845][ T1345] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 611.781820][ T1345] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 611.789789][ T1345] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 611.797758][ T1345] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 07:16:49 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7400000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:49 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf8ce0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:49 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7741000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:49 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x77f4000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 611.805729][ T1345] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:50 executing program 1 (fault-call:15 fault-nth:7): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:50 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfc000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x5c000000}) 07:16:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) pipe2(&(0x7f0000000000), 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:50 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_LAST_MEMBER_CNT={0x8}]}}}]}, 0x3c}}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r2, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r2, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000280)=@security={'security\x00', 0xe, 0x4, 0x3e0, 0x0, 0x128, 0x128, 0x128, 0x128, 0x348, 0x348, 0x348, 0x348, 0x348, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x5, 0x4}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @random="8cf85bdc72d9", 0x7ff, 0x9, [0x29, 0x7, 0x9, 0x28, 0x20, 0x2a, 0x2a, 0x21, 0x3c, 0x3d, 0x33, 0x2c, 0x17, 0x3e, 0x10, 0x39], 0x1, 0x8, 0x81}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0xd, 0x10, [0x2d, 0x25, 0x23, 0x24, 0x2e, 0x2c, 0x2f, 0x0, 0x2, 0x10, 0x28, 0xb, 0xd, 0x2f, 0x8, 0xc], 0x3, 0xe27, 0x1ff}}}, {{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x101, 0x880, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 0xfc00, 0xc, [0x1e, 0x30, 0x33, 0x20, 0x2b, 0x2a, 0x19, 0x33, 0x1f, 0x2c, 0xe, 0x6, 0x35, 0x1d, 0xb, 0x13], 0x2, 0x9, 0x10000}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r3 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x4924b68, 0x0) 07:16:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xe7ffffff}) 07:16:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) pipe2(&(0x7f0000000000), 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:50 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfe800000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 612.492543][ T1601] FAULT_INJECTION: forcing a failure. [ 612.492543][ T1601] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 612.505914][ T1601] CPU: 1 PID: 1601 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 612.513732][ T1601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.523799][ T1601] Call Trace: [ 612.527096][ T1601] dump_stack+0x1fb/0x318 [ 612.531434][ T1601] should_fail+0x555/0x770 [ 612.535861][ T1601] should_fail_alloc_page+0x55/0x60 [ 612.541062][ T1601] prepare_alloc_pages+0x283/0x460 [ 612.546173][ T1601] __alloc_pages_nodemask+0xb2/0x5d0 [ 612.551457][ T1601] alloc_pages_vma+0x4f7/0xd50 [ 612.551475][ T1601] shmem_alloc_and_acct_page+0x425/0xbb0 [ 612.551503][ T1601] shmem_getpage_gfp+0x2313/0x2a90 [ 612.566978][ T1601] shmem_file_read_iter+0x25c/0x9e0 [ 612.572195][ T1601] generic_file_splice_read+0x504/0x820 [ 612.577757][ T1601] ? splice_shrink_spd+0xb0/0xb0 [ 612.582716][ T1601] splice_direct_to_actor+0x39c/0xac0 [ 612.588084][ T1601] ? do_splice_direct+0x330/0x330 [ 612.593116][ T1601] do_splice_direct+0x200/0x330 [ 612.593136][ T1601] ? security_file_permission+0x90/0x350 [ 612.593149][ T1601] do_sendfile+0x7e4/0xfd0 [ 612.593172][ T1601] __x64_sys_sendfile64+0x176/0x1b0 [ 612.613195][ T1601] do_syscall_64+0xf7/0x1c0 [ 612.613210][ T1601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.613220][ T1601] RIP: 0033:0x45a639 [ 612.613230][ T1601] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.613236][ T1601] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 612.613246][ T1601] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 612.613252][ T1601] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 612.613258][ T1601] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 612.613264][ T1601] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 07:16:50 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7875000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xfdfdffff}) 07:16:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xfffffdfd}) [ 612.613275][ T1601] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:51 executing program 1 (fault-call:15 fault-nth:8): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xffffffe7}) 07:16:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) pipe2(&(0x7f0000000000), 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:51 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7a00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:51 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfe80ffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:51 executing program 3: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@nl=@proc, &(0x7f0000000080)=0x80, 0x80800) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x8, 0x70bd2c, 0x2b6, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x60085}, 0x40000000) syz_open_dev$vivid(&(0x7f0000000200)='/dev/video#\x00', 0x1, 0x2) r2 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x9, 0x100) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000280)) fchmod(r0, 0x81) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r3, 0xc02c563a, &(0x7f0000000300)={0x0, {0x6, 0x3, 0x3f, 0x5}, {0x80, 0xfc8, 0x1, 0xbc04}, {0xf777, 0x85}}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x200001, 0x0) bind$ax25(r4, &(0x7f0000000380)={{0x3, @default, 0x6}, [@bcast, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default]}, 0x48) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f0000000440)={0x0, 0x0, [], @raw_data=[0x9, 0x4, 0x6, 0xffff7fff, 0x3, 0x101, 0x4, 0x8, 0x3, 0x1000, 0x7, 0x8, 0x57d6, 0x4, 0x2, 0x400, 0x2, 0xffffffff, 0x7, 0xfffffe4c, 0x5, 0x40, 0x6, 0x7, 0x8, 0x8000, 0x80000001, 0x0, 0x401, 0x1, 0x0, 0x1f]}) mq_getsetattr(r2, &(0x7f0000000500)={0x5, 0x7, 0x100000001, 0x8, 0x10001, 0x3, 0x8, 0x4}, &(0x7f0000000540)) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, &(0x7f00000005c0)={0x3, 0x0, 0x3008, 0x8000, 0x8001, 0x401, 0x9, 0xc6e684eb5b06ffc8}) r6 = syz_open_dev$sndpcmp(&(0x7f0000000600)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff, 0x4ac80) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000640)={0x10001, 0x6, 0x74d, 0x1000}) r7 = syz_open_dev$audion(&(0x7f0000000680)='/dev/audio#\x00', 0x6, 0x412000) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/autofs\x00', 0x204000, 0x0) ioctl$KVM_IRQFD(r7, 0x4020ae76, &(0x7f0000000700)={r8, 0x35, 0x2, r5}) setsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000740)=0x1, 0x4) r9 = syz_open_dev$sndpcmp(&(0x7f0000000780)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) getsockopt$inet_mreq(r9, 0x0, 0x1e81ef8fd8e49840, &(0x7f00000007c0)={@rand_addr, @local}, &(0x7f0000000800)=0x8) utimes(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={{}, {0x0, 0x7530}}) r10 = syz_open_dev$adsp(&(0x7f00000008c0)='/dev/adsp#\x00', 0x1, 0x1) ioctl$KVM_SET_IRQCHIP(r10, 0x8208ae63, &(0x7f0000000900)={0x0, 0x0, @pic={0x80, 0x40, 0x0, 0x0, 0x7, 0x5, 0x2, 0x3, 0x20, 0x7, 0x3, 0x81, 0x7f, 0x0, 0x9, 0x7}}) r11 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r11, 0xae60) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000a00)) 07:16:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0xffffffff}) 07:16:51 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfec0ffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 613.357898][ T1863] FAULT_INJECTION: forcing a failure. [ 613.357898][ T1863] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 613.371263][ T1863] CPU: 0 PID: 1863 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 613.379075][ T1863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.389111][ T1863] Call Trace: [ 613.392383][ T1863] dump_stack+0x1fb/0x318 [ 613.396694][ T1863] should_fail+0x555/0x770 [ 613.401092][ T1863] should_fail_alloc_page+0x55/0x60 [ 613.406270][ T1863] prepare_alloc_pages+0x283/0x460 [ 613.411363][ T1863] __alloc_pages_nodemask+0xb2/0x5d0 [ 613.416646][ T1863] alloc_pages_vma+0x4f7/0xd50 [ 613.421392][ T1863] shmem_alloc_and_acct_page+0x425/0xbb0 [ 613.427016][ T1863] shmem_getpage_gfp+0x2313/0x2a90 [ 613.432120][ T1863] shmem_file_read_iter+0x25c/0x9e0 [ 613.437305][ T1863] generic_file_splice_read+0x504/0x820 [ 613.442835][ T1863] ? splice_shrink_spd+0xb0/0xb0 [ 613.447750][ T1863] splice_direct_to_actor+0x39c/0xac0 [ 613.453096][ T1863] ? do_splice_direct+0x330/0x330 [ 613.458105][ T1863] do_splice_direct+0x200/0x330 [ 613.462935][ T1863] ? security_file_permission+0x90/0x350 [ 613.468548][ T1863] do_sendfile+0x7e4/0xfd0 [ 613.473127][ T1863] __x64_sys_sendfile64+0x176/0x1b0 [ 613.478304][ T1863] do_syscall_64+0xf7/0x1c0 [ 613.482811][ T1863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.488696][ T1863] RIP: 0033:0x45a639 [ 613.492576][ T1863] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.512631][ T1863] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 613.521026][ T1863] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 613.528979][ T1863] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 613.536950][ T1863] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 613.544902][ T1863] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 07:16:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500"}) 07:16:51 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x73, 0x1, 0x10000, "e122ac2bb1bfb6f4032aeb93617ecabae0446cc540723e7fefa13297ac2cc5a4c8e47702e79a016b8b207ad6a9cd805fc75a6cf8445917557cf7908e039c5358bf3b30e50a00f4f25306274a6d23b1826d8c98aeda3d21bc1786bd3c00169b0144fc8689a02b577475fe0ad387afcd8746a967"}) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r0, 0x80000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r3, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r3, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x1, &(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYRESOCT=0x0, @ANYPTR64, @ANYRES32], @ANYRESOCT=r0]], &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 613.552855][ T1863] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) pipe2(&(0x7f0000000000), 0x4000) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:51 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7f00000800000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:52 executing program 1 (fault-call:15 fault-nth:9): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x2}) 07:16:52 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfeffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:52 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7f25000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) pipe2(&(0x7f0000000000), 0x4000) socket$inet(0x2, 0x4000000805, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x3}) 07:16:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) pipe2(&(0x7f0000000000), 0x4000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x4}) [ 614.205875][ T2102] FAULT_INJECTION: forcing a failure. [ 614.205875][ T2102] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 614.219227][ T2102] CPU: 0 PID: 2102 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 614.227043][ T2102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.237092][ T2102] Call Trace: [ 614.240381][ T2102] dump_stack+0x1fb/0x318 [ 614.244714][ T2102] should_fail+0x555/0x770 [ 614.249141][ T2102] should_fail_alloc_page+0x55/0x60 [ 614.254329][ T2102] prepare_alloc_pages+0x283/0x460 [ 614.254345][ T2102] __alloc_pages_nodemask+0xb2/0x5d0 [ 614.254367][ T2102] alloc_pages_vma+0x4f7/0xd50 [ 614.254384][ T2102] shmem_alloc_and_acct_page+0x425/0xbb0 [ 614.254415][ T2102] shmem_getpage_gfp+0x2313/0x2a90 [ 614.264789][ T2102] shmem_file_read_iter+0x25c/0x9e0 [ 614.264816][ T2102] generic_file_splice_read+0x504/0x820 [ 614.264833][ T2102] ? splice_shrink_spd+0xb0/0xb0 [ 614.295921][ T2102] splice_direct_to_actor+0x39c/0xac0 [ 614.301292][ T2102] ? do_splice_direct+0x330/0x330 [ 614.306330][ T2102] do_splice_direct+0x200/0x330 [ 614.311181][ T2102] ? security_file_permission+0x90/0x350 [ 614.311195][ T2102] do_sendfile+0x7e4/0xfd0 [ 614.321226][ T2102] __x64_sys_sendfile64+0x176/0x1b0 [ 614.326428][ T2102] do_syscall_64+0xf7/0x1c0 [ 614.326444][ T2102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.326453][ T2102] RIP: 0033:0x45a639 [ 614.326463][ T2102] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.326469][ T2102] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 614.326478][ T2102] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 614.326484][ T2102] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 614.326490][ T2102] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 614.326495][ T2102] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 07:16:52 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xff000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 614.326504][ T2102] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x1080, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000000)="66ba430066b8090066ef0fc04700c74424000d000000c7ca442402b30b00000044240600000000011c240f233748b807000000000000803e653e0f6fc00f21f835800000d00f23f826d8ba3e000000670fdaa8f27f0000b8010000000f01c1c4e1aa5fe30f20c035000000800f22c0", 0x6f}], 0x39, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:16:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x5}) 07:16:52 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xff7e0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:53 executing program 1 (fault-call:15 fault-nth:10): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:53 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7fd8000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:53 executing program 3: setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x1c) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r5, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1150) mount(0x0, &(0x7f0000000240)='./file1/../file0\x00', 0x0, 0x0, &(0x7f0000000300)='io.stat\x00') ftruncate(r3, 0x48280) r6 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xfffffff4) io_submit(r4, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x79, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) syz_open_procfs(0x0, 0x0) 07:16:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) io_setup(0x5, &(0x7f0000000240)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x6}) 07:16:53 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffff0000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x7}) 07:16:53 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 615.003726][ T26] audit: type=1804 audit(1574061413.187:58): pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir853838105/syzkaller.FE9EWZ/1307/bus" dev="sda1" ino=18416 res=1 [ 615.086804][ T2378] FAULT_INJECTION: forcing a failure. [ 615.086804][ T2378] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 615.100153][ T2378] CPU: 1 PID: 2378 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 615.107973][ T2378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.115986][ T26] audit: type=1804 audit(1574061413.197:59): pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir853838105/syzkaller.FE9EWZ/1307/bus" dev="sda1" ino=18416 res=1 [ 615.118023][ T2378] Call Trace: [ 615.118041][ T2378] dump_stack+0x1fb/0x318 [ 615.118058][ T2378] should_fail+0x555/0x770 [ 615.118076][ T2378] should_fail_alloc_page+0x55/0x60 [ 615.155476][ T26] audit: type=1804 audit(1574061413.287:60): pid=2380 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir853838105/syzkaller.FE9EWZ/1307/bus" dev="sda1" ino=18416 res=1 [ 615.158255][ T2378] prepare_alloc_pages+0x283/0x460 [ 615.158271][ T2378] __alloc_pages_nodemask+0xb2/0x5d0 [ 615.158296][ T2378] alloc_pages_vma+0x4f7/0xd50 [ 615.196426][ T2378] shmem_alloc_and_acct_page+0x425/0xbb0 [ 615.202079][ T2378] shmem_getpage_gfp+0x2313/0x2a90 [ 615.202519][ T26] audit: type=1804 audit(1574061413.287:61): pid=2380 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir853838105/syzkaller.FE9EWZ/1307/bus" dev="sda1" ino=18416 res=1 [ 615.207206][ T2378] shmem_file_read_iter+0x25c/0x9e0 [ 615.207233][ T2378] generic_file_splice_read+0x504/0x820 [ 615.207251][ T2378] ? splice_shrink_spd+0xb0/0xb0 [ 615.245861][ T2378] splice_direct_to_actor+0x39c/0xac0 [ 615.251226][ T2378] ? do_splice_direct+0x330/0x330 [ 615.256261][ T2378] do_splice_direct+0x200/0x330 [ 615.261114][ T2378] ? security_file_permission+0x90/0x350 [ 615.266746][ T2378] do_sendfile+0x7e4/0xfd0 [ 615.271200][ T2378] __x64_sys_sendfile64+0x176/0x1b0 [ 615.276418][ T2378] do_syscall_64+0xf7/0x1c0 [ 615.280922][ T2378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.286807][ T2378] RIP: 0033:0x45a639 [ 615.290694][ T2378] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.290700][ T2378] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 615.290710][ T2378] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 615.290717][ T2378] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 07:16:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x8}) 07:16:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:53 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8004020000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:53 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffff80fe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 615.290722][ T2378] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 615.290729][ T2378] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 615.290735][ T2378] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 [ 615.292408][ C1] net_ratelimit: 24 callbacks suppressed [ 615.292416][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 615.310602][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 615.376058][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:53 executing program 1 (fault-call:15 fault-nth:11): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:53 executing program 3: open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r0, r1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000075c0)={'team0\x00'}) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 07:16:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x9}) 07:16:53 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8059000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:53 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffffc0fe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xa}) 07:16:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 615.981304][ T2705] FAULT_INJECTION: forcing a failure. [ 615.981304][ T2705] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 615.995432][ T2705] CPU: 0 PID: 2705 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 616.003247][ T2705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.013303][ T2705] Call Trace: [ 616.016595][ T2705] dump_stack+0x1fb/0x318 [ 616.020934][ T2705] should_fail+0x555/0x770 [ 616.025359][ T2705] should_fail_alloc_page+0x55/0x60 [ 616.030557][ T2705] prepare_alloc_pages+0x283/0x460 [ 616.035674][ T2705] __alloc_pages_nodemask+0xb2/0x5d0 [ 616.040974][ T2705] alloc_pages_vma+0x4f7/0xd50 [ 616.045742][ T2705] shmem_alloc_and_acct_page+0x425/0xbb0 [ 616.051391][ T2705] shmem_getpage_gfp+0x2313/0x2a90 [ 616.056526][ T2705] shmem_file_read_iter+0x25c/0x9e0 [ 616.061739][ T2705] generic_file_splice_read+0x504/0x820 [ 616.067296][ T2705] ? splice_shrink_spd+0xb0/0xb0 [ 616.072248][ T2705] splice_direct_to_actor+0x39c/0xac0 [ 616.077617][ T2705] ? do_splice_direct+0x330/0x330 [ 616.082650][ T2705] do_splice_direct+0x200/0x330 [ 616.087502][ T2705] ? security_file_permission+0x90/0x350 [ 616.093140][ T2705] do_sendfile+0x7e4/0xfd0 [ 616.097572][ T2705] __x64_sys_sendfile64+0x176/0x1b0 [ 616.102771][ T2705] do_syscall_64+0xf7/0x1c0 [ 616.107292][ T2705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.113180][ T2705] RIP: 0033:0x45a639 [ 616.117066][ T2705] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.136819][ T2705] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 616.145228][ T2705] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 616.153198][ T2705] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 616.161164][ T2705] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 616.169130][ T2705] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 07:16:54 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffffff8d, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:54 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8709000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xb}) [ 616.177097][ T2705] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 [ 616.186358][ C0] IPv4: Oversized IP packet from 127.0.0.1 07:16:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:54 executing program 1 (fault-call:15 fault-nth:12): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xc}) 07:16:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:54 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffffffe0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x32) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) write(r0, &(0x7f00000009c0)="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", 0x91f) 07:16:54 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x87bc000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xd}) 07:16:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x28, &(0x7f0000000200)}, 0x10) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x10001, 0x1008, 0x8, 0x2, 0x1b, 0x0, 0x6, 0x72, 0x5, 0x60000000, 0x7fffffff, 0x4}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x8, 0x1, 0x81}) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) io_uring_register$IORING_UNREGISTER_FILES(r2, 0x3, 0x0, 0x0) r7 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$ax25_int(r7, 0x101, 0xc, &(0x7f0000000000)=0x200, 0x4) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) connect$ax25(r7, &(0x7f0000000080)={{0x3, @default, 0x6}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default]}, 0x48) 07:16:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xe}) 07:16:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:55 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfffffff5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:55 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x883d000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 616.784152][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 616.790010][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 616.795871][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 616.801628][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 616.807462][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 616.813231][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 616.913882][ T2963] FAULT_INJECTION: forcing a failure. [ 616.913882][ T2963] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 616.927276][ T2963] CPU: 0 PID: 2963 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 616.935089][ T2963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.945138][ T2963] Call Trace: [ 616.948424][ T2963] dump_stack+0x1fb/0x318 [ 616.952760][ T2963] should_fail+0x555/0x770 [ 616.957187][ T2963] should_fail_alloc_page+0x55/0x60 [ 616.960185][ T2955] ax25_connect(): syz-executor.3 uses autobind, please contact jreuter@yaina.de [ 616.962381][ T2963] prepare_alloc_pages+0x283/0x460 [ 616.962398][ T2963] __alloc_pages_nodemask+0xb2/0x5d0 [ 616.962419][ T2963] alloc_pages_vma+0x4f7/0xd50 [ 616.986556][ T2963] shmem_alloc_and_acct_page+0x425/0xbb0 [ 616.992240][ T2963] shmem_getpage_gfp+0x2313/0x2a90 [ 616.997376][ T2963] shmem_file_read_iter+0x25c/0x9e0 [ 617.000534][ T2968] ax25_connect(): syz-executor.3 uses autobind, please contact jreuter@yaina.de [ 617.002586][ T2963] generic_file_splice_read+0x504/0x820 [ 617.002610][ T2963] ? splice_shrink_spd+0xb0/0xb0 [ 617.022066][ T2963] splice_direct_to_actor+0x39c/0xac0 [ 617.027432][ T2963] ? do_splice_direct+0x330/0x330 [ 617.032463][ T2963] do_splice_direct+0x200/0x330 [ 617.037324][ T2963] ? security_file_permission+0x90/0x350 [ 617.042962][ T2963] do_sendfile+0x7e4/0xfd0 [ 617.047397][ T2963] __x64_sys_sendfile64+0x176/0x1b0 [ 617.052605][ T2963] do_syscall_64+0xf7/0x1c0 [ 617.057118][ T2963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.063006][ T2963] RIP: 0033:0x45a639 [ 617.066911][ T2963] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.086514][ T2963] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 617.094926][ T2963] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 617.102894][ T2963] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 617.110865][ T2963] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 617.118838][ T2963] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 617.126812][ T2963] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:55 executing program 1 (fault-call:15 fault-nth:13): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x10}) 07:16:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x7, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d71200eb3199772f0577915623cdca191dcc06ee3e0449a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f8f9d0d807177135100"}, 0xd8) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000000)=0x2f3a) 07:16:55 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfffffffe, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:55 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x88f0000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x11}) 07:16:55 executing program 4: close(0xffffffffffffffff) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:55 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x10000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) prctl$PR_SET_NAME(0xf, &(0x7f0000000340)='cgroupkeyringselinuxeth1\\userselinux\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x6b, 0x0, 0x8) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) read$alg(r6, &(0x7f0000001840)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) r8 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r8, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x65, &(0x7f0000000280)=[@in6={0xa, 0x4e20, 0xffffffc0, @mcast2, 0x20}, @in6={0xa, 0x4e22, 0x8001, @remote, 0x1}, @in6={0xa, 0x4e23, 0xffff8001, @remote, 0x4}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e22, 0x2e55, @loopback, 0x80000001}, @in6={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x25}, 0x3}], 0x9c) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f0000000100)={0xaa90, 0x0, 0x3015, 0x7fff, 0x9, {0x3, 0x7fffffff}, 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffc0}}, 0x48) [ 617.761515][ T3236] FAULT_INJECTION: forcing a failure. [ 617.761515][ T3236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 617.774953][ T3236] CPU: 1 PID: 3236 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 617.782773][ T3236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.792825][ T3236] Call Trace: [ 617.796122][ T3236] dump_stack+0x1fb/0x318 [ 617.800546][ T3236] should_fail+0x555/0x770 [ 617.804979][ T3236] should_fail_alloc_page+0x55/0x60 [ 617.810183][ T3236] prepare_alloc_pages+0x283/0x460 [ 617.815299][ T3236] __alloc_pages_nodemask+0xb2/0x5d0 [ 617.820595][ T3236] alloc_pages_vma+0x4f7/0xd50 [ 617.825362][ T3236] shmem_alloc_and_acct_page+0x425/0xbb0 [ 617.831016][ T3236] shmem_getpage_gfp+0x2313/0x2a90 [ 617.836151][ T3236] shmem_file_read_iter+0x25c/0x9e0 [ 617.841363][ T3236] generic_file_splice_read+0x504/0x820 [ 617.846912][ T3236] ? splice_shrink_spd+0xb0/0xb0 [ 617.851851][ T3236] splice_direct_to_actor+0x39c/0xac0 [ 617.857314][ T3236] ? do_splice_direct+0x330/0x330 [ 617.862345][ T3236] do_splice_direct+0x200/0x330 [ 617.867202][ T3236] ? security_file_permission+0x90/0x350 [ 617.872842][ T3236] do_sendfile+0x7e4/0xfd0 [ 617.877270][ T3236] __x64_sys_sendfile64+0x176/0x1b0 [ 617.882467][ T3236] do_syscall_64+0xf7/0x1c0 [ 617.886980][ T3236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.892873][ T3236] RIP: 0033:0x45a639 07:16:55 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8dffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:56 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x8fa0000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 617.896760][ T3236] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.916357][ T3236] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 617.924855][ T3236] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 617.932820][ T3236] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 617.940783][ T3236] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 617.940790][ T3236] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 617.940796][ T3236] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:56 executing program 1 (fault-call:15 fault-nth:14): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x12}) 07:16:56 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x9021000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:56 executing program 4: close(0xffffffffffffffff) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:56 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="30000000100001000000cd289492e9292f8f0000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000000800270000000000"], 0x30}}, 0x0) 07:16:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x25}) [ 618.455509][ T3390] validate_nla: 2 callbacks suppressed [ 618.455516][ T3390] netlink: 'syz-executor.3': attribute type 39 has an invalid length. 07:16:56 executing program 4: close(0xffffffffffffffff) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b4788831", 0x39}], 0x4, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) kcmp(r0, r0, 0x4, r1, r2) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000180)={'icmp\x00'}, &(0x7f0000000200)=0x1e) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000140)=r3, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x30, 0x5c55256255db236d, 0x1, 0x800, 0x6, 0x7, 0x76}, 0x0) 07:16:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 618.628965][ T3449] FAULT_INJECTION: forcing a failure. [ 618.628965][ T3449] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 618.642427][ T3449] CPU: 1 PID: 3449 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 618.650250][ T3449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.660306][ T3449] Call Trace: [ 618.663600][ T3449] dump_stack+0x1fb/0x318 [ 618.667939][ T3449] should_fail+0x555/0x770 [ 618.672363][ T3449] should_fail_alloc_page+0x55/0x60 [ 618.677589][ T3449] prepare_alloc_pages+0x283/0x460 [ 618.682695][ T3449] __alloc_pages_nodemask+0xb2/0x5d0 [ 618.687975][ T3449] alloc_pages_vma+0x4f7/0xd50 [ 618.687992][ T3449] shmem_alloc_and_acct_page+0x425/0xbb0 [ 618.688028][ T3449] shmem_getpage_gfp+0x2313/0x2a90 [ 618.703502][ T3449] shmem_file_read_iter+0x25c/0x9e0 [ 618.708716][ T3449] generic_file_splice_read+0x504/0x820 [ 618.714275][ T3449] ? splice_shrink_spd+0xb0/0xb0 [ 618.719214][ T3449] splice_direct_to_actor+0x39c/0xac0 [ 618.724579][ T3449] ? do_splice_direct+0x330/0x330 07:16:56 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x90d4000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 618.729607][ T3449] do_splice_direct+0x200/0x330 [ 618.734460][ T3449] ? security_file_permission+0x90/0x350 [ 618.740091][ T3449] do_sendfile+0x7e4/0xfd0 [ 618.744522][ T3449] __x64_sys_sendfile64+0x176/0x1b0 [ 618.749722][ T3449] do_syscall_64+0xf7/0x1c0 [ 618.754227][ T3449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.754238][ T3449] RIP: 0033:0x45a639 [ 618.754249][ T3449] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.783727][ T3449] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 618.783739][ T3449] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 618.783744][ T3449] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 618.783749][ T3449] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 618.783754][ T3449] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 618.783760][ T3449] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:16:57 executing program 1 (fault-call:15 fault-nth:15): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x5c}) 07:16:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:57 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:57 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x9784000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xe7}) 07:16:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x0, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 619.481945][ T3657] FAULT_INJECTION: forcing a failure. [ 619.481945][ T3657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 619.495406][ T3657] CPU: 1 PID: 3657 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 619.503238][ T3657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.513297][ T3657] Call Trace: [ 619.516616][ T3657] dump_stack+0x1fb/0x318 [ 619.520956][ T3657] should_fail+0x555/0x770 [ 619.525385][ T3657] should_fail_alloc_page+0x55/0x60 [ 619.530585][ T3657] prepare_alloc_pages+0x283/0x460 [ 619.535706][ T3657] __alloc_pages_nodemask+0xb2/0x5d0 [ 619.541000][ T3657] alloc_pages_vma+0x4f7/0xd50 [ 619.545773][ T3657] shmem_alloc_and_acct_page+0x425/0xbb0 [ 619.551426][ T3657] shmem_getpage_gfp+0x2313/0x2a90 [ 619.556564][ T3657] shmem_file_read_iter+0x25c/0x9e0 [ 619.561779][ T3657] generic_file_splice_read+0x504/0x820 [ 619.567323][ T3657] ? splice_shrink_spd+0xb0/0xb0 [ 619.572261][ T3657] splice_direct_to_actor+0x39c/0xac0 [ 619.577623][ T3657] ? do_splice_direct+0x330/0x330 07:16:57 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 619.582647][ T3657] do_splice_direct+0x200/0x330 [ 619.587489][ T3657] ? security_file_permission+0x90/0x350 [ 619.587502][ T3657] do_sendfile+0x7e4/0xfd0 [ 619.587527][ T3657] __x64_sys_sendfile64+0x176/0x1b0 [ 619.587542][ T3657] do_syscall_64+0xf7/0x1c0 [ 619.587556][ T3657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.587564][ T3657] RIP: 0033:0x45a639 [ 619.587573][ T3657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 619.587579][ T3657] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 619.587589][ T3657] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 619.587595][ T3657] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 619.587600][ T3657] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 619.587609][ T3657] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 619.613149][ T3657] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 [ 620.954138][ C1] net_ratelimit: 19 callbacks suppressed [ 620.954144][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 620.965572][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 620.971349][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 620.977137][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 620.982891][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 620.988702][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 621.264154][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 621.269925][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 621.594209][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 621.599992][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@uni_xlate='uni_xlate=1'}]}) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) r1 = socket(0x8, 0x1, 0x81) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000240)={0x5, 0x4b564d01, &(0x7f00000000c0)="9ebd4f30b2515b2ab60405ff5f58", &(0x7f0000000100)="bdb5597f42836eeb975247e2beea5aa94fa81c2ace7025e1b1d8bc11af0b6dfcdea4e87e178414539f8fb84bacce4e5b7ad660a8facac844c8477fdcec73489ea2a2cea15d13e19175b1f9c16fef1ddc7ba41df857fd1d95c333d4ad61f197ffdd6df2a2fede09ea7879ef0c4492449a8f1a240d302039a2ac8d01675345daf21cba3f47ec382ecf0bbe94a26106b69dd7b1abefaacdcc038beb29c031f4371d303dd340c2218782eebd0afabe40b804ec0b2e80fdea905eea7ca6b1db3a6316b0a248c168c12c48ab70332efc6dec4ce445de8ab522c745fb29ee0298bf98bafe36a1f70bc7b92db10f67e6cf07b12c3c5de972853a94a5", 0xe, 0xf8}) 07:16:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x0, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:16:59 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x9805000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x300}) 07:16:59 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:16:59 executing program 1 (fault-call:15 fault-nth:16): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:16:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x500}) 07:16:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x0, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 621.838014][ T3971] FAULT_INJECTION: forcing a failure. [ 621.838014][ T3971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 621.851407][ T3971] CPU: 0 PID: 3971 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 621.859223][ T3971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.869278][ T3971] Call Trace: [ 621.872592][ T3971] dump_stack+0x1fb/0x318 [ 621.876926][ T3971] should_fail+0x555/0x770 [ 621.881380][ T3971] should_fail_alloc_page+0x55/0x60 [ 621.886577][ T3971] prepare_alloc_pages+0x283/0x460 [ 621.891691][ T3971] __alloc_pages_nodemask+0xb2/0x5d0 [ 621.896982][ T3971] alloc_pages_vma+0x4f7/0xd50 [ 621.901753][ T3971] shmem_alloc_and_acct_page+0x425/0xbb0 [ 621.907398][ T3971] shmem_getpage_gfp+0x2313/0x2a90 [ 621.912536][ T3971] shmem_file_read_iter+0x25c/0x9e0 [ 621.917740][ T3971] generic_file_splice_read+0x504/0x820 [ 621.923466][ T3971] ? splice_shrink_spd+0xb0/0xb0 [ 621.928401][ T3971] splice_direct_to_actor+0x39c/0xac0 [ 621.933767][ T3971] ? do_splice_direct+0x330/0x330 [ 621.938807][ T3971] do_splice_direct+0x200/0x330 [ 621.943668][ T3971] ? security_file_permission+0x90/0x350 [ 621.949302][ T3971] do_sendfile+0x7e4/0xfd0 [ 621.953734][ T3971] __x64_sys_sendfile64+0x176/0x1b0 [ 621.958950][ T3971] do_syscall_64+0xf7/0x1c0 [ 621.963636][ T3971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.969525][ T3971] RIP: 0033:0x45a639 07:17:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x600}) 07:17:00 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x10000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:00 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x98b8000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 621.969537][ T3971] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 621.993621][ T3971] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 621.993632][ T3971] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 621.993637][ T3971] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 621.993647][ T3971] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 621.993653][ T3971] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 621.993659][ T3971] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:00 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x9f68000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:00 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000400), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @dev={[], 0xd}}}, 0xc1, 0x0}, 0x25000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r1, &(0x7f0000000440)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000480)=ANY=[]) socketpair(0x15, 0x3, 0x1, &(0x7f0000000140)) gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x22, 0x0, 0xccd, 0x0, 0x8, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r9, 0x9}, 0x8) r10 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r10, 0x0, 0x40000020) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r11, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 07:17:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x700}) 07:17:00 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb3000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x0, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x900}) 07:17:00 executing program 1 (fault-call:15 fault-nth:17): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:00 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa09c000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xa00}) 07:17:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x0, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:00 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x100000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xb00}) [ 622.696040][ T4555] FAULT_INJECTION: forcing a failure. [ 622.696040][ T4555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 622.709661][ T4555] CPU: 0 PID: 4555 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 622.717474][ T4555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.727522][ T4555] Call Trace: [ 622.730816][ T4555] dump_stack+0x1fb/0x318 [ 622.735153][ T4555] should_fail+0x555/0x770 [ 622.739570][ T4555] should_fail_alloc_page+0x55/0x60 07:17:00 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa74c000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 622.744761][ T4555] prepare_alloc_pages+0x283/0x460 [ 622.749875][ T4555] __alloc_pages_nodemask+0xb2/0x5d0 [ 622.755164][ T4555] alloc_pages_vma+0x4f7/0xd50 [ 622.755183][ T4555] shmem_alloc_and_acct_page+0x425/0xbb0 [ 622.755213][ T4555] shmem_getpage_gfp+0x2313/0x2a90 [ 622.755246][ T4555] shmem_file_read_iter+0x25c/0x9e0 [ 622.755270][ T4555] generic_file_splice_read+0x504/0x820 [ 622.765631][ T4555] ? splice_shrink_spd+0xb0/0xb0 [ 622.765644][ T4555] splice_direct_to_actor+0x39c/0xac0 [ 622.765653][ T4555] ? do_splice_direct+0x330/0x330 [ 622.765677][ T4555] do_splice_direct+0x200/0x330 [ 622.765693][ T4555] ? security_file_permission+0x90/0x350 [ 622.765707][ T4555] do_sendfile+0x7e4/0xfd0 [ 622.765734][ T4555] __x64_sys_sendfile64+0x176/0x1b0 [ 622.765749][ T4555] do_syscall_64+0xf7/0x1c0 [ 622.765763][ T4555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.786466][ T4555] RIP: 0033:0x45a639 [ 622.786477][ T4555] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 622.786482][ T4555] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 622.786492][ T4555] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 622.786498][ T4555] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 622.786503][ T4555] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 622.786508][ T4555] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 622.786514][ T4555] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xc00}) 07:17:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x0, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:01 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa880000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:01 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x103000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000400), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @dev={[], 0xd}}}, 0xc1, 0x0}, 0x25000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r1, &(0x7f0000000440)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000480)=ANY=[]) socketpair(0x15, 0x3, 0x1, &(0x7f0000000140)) gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x22, 0x0, 0xccd, 0x0, 0x8, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r9, 0x9}, 0x8) r10 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r10, 0x0, 0x40000020) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r11, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 07:17:01 executing program 1 (fault-call:15 fault-nth:18): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xd00}) 07:17:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:01 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xaa1414ac00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:01 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x200000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xe00}) 07:17:01 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x300000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x1100}) [ 623.580932][ T5104] FAULT_INJECTION: forcing a failure. [ 623.580932][ T5104] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 623.594487][ T5104] CPU: 0 PID: 5104 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 623.602306][ T5104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.612358][ T5104] Call Trace: [ 623.615651][ T5104] dump_stack+0x1fb/0x318 [ 623.619990][ T5104] should_fail+0x555/0x770 [ 623.624413][ T5104] should_fail_alloc_page+0x55/0x60 07:17:01 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xaf30000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000400), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @dev={[], 0xd}}}, 0xc1, 0x0}, 0x25000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r1, &(0x7f0000000440)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000480)=ANY=[]) socketpair(0x15, 0x3, 0x1, &(0x7f0000000140)) gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x22, 0x0, 0xccd, 0x0, 0x8, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r9, 0x9}, 0x8) r10 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r10, 0x0, 0x40000020) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r11 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r11, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 623.629609][ T5104] prepare_alloc_pages+0x283/0x460 [ 623.634728][ T5104] __alloc_pages_nodemask+0xb2/0x5d0 [ 623.640043][ T5104] alloc_pages_vma+0x4f7/0xd50 [ 623.644810][ T5104] shmem_alloc_and_acct_page+0x425/0xbb0 [ 623.650468][ T5104] shmem_getpage_gfp+0x2313/0x2a90 [ 623.655596][ T5104] shmem_file_read_iter+0x25c/0x9e0 [ 623.660805][ T5104] generic_file_splice_read+0x504/0x820 [ 623.660823][ T5104] ? splice_shrink_spd+0xb0/0xb0 [ 623.671274][ T5104] splice_direct_to_actor+0x39c/0xac0 [ 623.676644][ T5104] ? do_splice_direct+0x330/0x330 [ 623.681677][ T5104] do_splice_direct+0x200/0x330 [ 623.686533][ T5104] ? security_file_permission+0x90/0x350 [ 623.692178][ T5104] do_sendfile+0x7e4/0xfd0 [ 623.692205][ T5104] __x64_sys_sendfile64+0x176/0x1b0 [ 623.692227][ T5104] do_syscall_64+0xf7/0x1c0 [ 623.706300][ T5104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.712179][ T5104] RIP: 0033:0x45a639 [ 623.712190][ T5104] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 623.712196][ T5104] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 623.712206][ T5104] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 623.712217][ T5104] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 623.712223][ T5104] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 623.712232][ T5104] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 623.735695][ T5104] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:02 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x400000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:02 executing program 1 (fault-call:15 fault-nth:19): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x1200}) 07:17:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:02 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xafe3000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:02 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x500000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:02 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RWALK(r0, &(0x7f0000000080)={0x57, 0x6f, 0x2, {0x6, [{0x20, 0x2, 0x2}, {0x10, 0x2, 0x5}, {0x8, 0x0, 0x3}, {0x20, 0x3, 0x5}, {0x8, 0x4, 0x5}, {0x14, 0x4, 0x8}]}}, 0x57) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100), 0x20080) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) 07:17:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x2500}) 07:17:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1c) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x5) 07:17:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 624.492728][ T5657] FAULT_INJECTION: forcing a failure. [ 624.492728][ T5657] name failslab, interval 1, probability 0, space 0, times 0 [ 624.505519][ T5657] CPU: 0 PID: 5657 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 624.513343][ T5657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.523397][ T5657] Call Trace: [ 624.526695][ T5657] dump_stack+0x1fb/0x318 [ 624.531030][ T5657] should_fail+0x555/0x770 [ 624.535454][ T5657] __should_failslab+0x11a/0x160 07:17:02 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x600000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x4000}) 07:17:02 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb064000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 624.540393][ T5657] should_failslab+0x9/0x20 [ 624.544941][ T5657] kmem_cache_alloc_node+0x65/0x280 [ 624.550133][ T5657] ? __alloc_skb+0x9f/0x500 [ 624.554630][ T5657] __alloc_skb+0x9f/0x500 [ 624.558962][ T5657] ? validate_chain+0x92/0x7bc0 [ 624.563808][ T5657] alloc_skb_with_frags+0xb6/0x600 [ 624.563851][ T5657] sock_alloc_send_pskb+0x7cc/0xbc0 [ 624.563863][ T5657] ? __kasan_check_read+0x11/0x20 [ 624.563885][ T5657] sock_alloc_send_skb+0x32/0x40 [ 624.579191][ T5657] __ip_append_data+0x1f9c/0x31a0 [ 624.589120][ T5657] ? ip_skb_dst_mtu+0x510/0x510 [ 624.593976][ T5657] ? lock_sock_nested+0xa8/0x120 [ 624.594000][ T5657] ip_append_data+0x120/0x190 [ 624.594011][ T5657] ? ip_skb_dst_mtu+0x510/0x510 [ 624.608422][ T5657] udp_sendmsg+0x30a/0x31a0 [ 624.608434][ T5657] ? ip_skb_dst_mtu+0x510/0x510 [ 624.608472][ T5657] ? __lock_acquire+0xc75/0x1be0 [ 624.608487][ T5657] udp_sendpage+0xca/0x580 [ 624.617802][ T5657] ? read_seqcount_begin+0x12a/0x1c0 [ 624.617818][ T5657] ? udplite_getfrag+0x60/0x60 [ 624.627132][ T5657] inet_sendpage+0x16d/0x340 [ 624.627146][ T5657] ? inet_sendmsg+0x310/0x310 [ 624.627160][ T5657] sock_sendpage+0xd3/0x120 [ 624.627182][ T5657] pipe_to_sendpage+0x1f9/0x2a0 [ 624.627191][ T5657] ? sock_fasync+0x100/0x100 [ 624.627205][ T5657] __splice_from_pipe+0x2f7/0x8a0 [ 624.627217][ T5657] ? generic_splice_sendpage+0x180/0x180 [ 624.627239][ T5657] generic_splice_sendpage+0x114/0x180 [ 624.627253][ T5657] ? iter_file_splice_write+0xe20/0xe20 [ 624.627264][ T5657] direct_splice_actor+0xf7/0x130 [ 624.627277][ T5657] splice_direct_to_actor+0x463/0xac0 [ 624.627290][ T5657] ? do_splice_direct+0x330/0x330 [ 624.637399][ T5657] do_splice_direct+0x200/0x330 [ 624.637418][ T5657] ? security_file_permission+0x90/0x350 [ 624.637432][ T5657] do_sendfile+0x7e4/0xfd0 [ 624.637461][ T5657] __x64_sys_sendfile64+0x176/0x1b0 [ 624.637476][ T5657] do_syscall_64+0xf7/0x1c0 [ 624.637498][ T5657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.651206][ T5657] RIP: 0033:0x45a639 [ 624.651217][ T5657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.651222][ T5657] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 624.651232][ T5657] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 624.651238][ T5657] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 624.651244][ T5657] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 624.651251][ T5657] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 624.651256][ T5657] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 [ 624.906386][ T5652] input: syz1 as /devices/virtual/input/input19 07:17:03 executing program 1 (fault-call:15 fault-nth:20): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x5c00}) 07:17:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:03 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x700000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:03 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb714000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:03 executing program 3: ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x10, 0x0) syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x8, 0x40) r2 = syz_open_procfs(0x0, 0x0) read(r2, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@initdev, @in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) lstat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) socket(0x0, 0x200000003, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) lstat(0x0, &(0x7f0000000640)) r3 = socket(0x8000400000000010, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) setreuid(0x0, 0x0) socket(0x8000400000000010, 0x0, 0x0) getresgid(&(0x7f0000000180), 0x0, &(0x7f00000003c0)) fchown(0xffffffffffffffff, 0x0, 0x0) getresgid(&(0x7f0000000180), 0x0, &(0x7f00000003c0)) fchown(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x2) memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00', 0x0) syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@initdev, @in6}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), 0x0) getgroups(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)='4', 0x4100) 07:17:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xe7ff}) 07:17:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 625.205412][ T26] audit: type=1800 audit(1574061423.397:62): pid=5785 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=17251 res=0 07:17:03 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb7c7000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xfdfd}) [ 625.409479][ T5909] FAULT_INJECTION: forcing a failure. [ 625.409479][ T5909] name failslab, interval 1, probability 0, space 0, times 0 [ 625.422276][ T5909] CPU: 1 PID: 5909 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 625.430094][ T5909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.440150][ T5909] Call Trace: [ 625.443445][ T5909] dump_stack+0x1fb/0x318 [ 625.447784][ T5909] should_fail+0x555/0x770 [ 625.452214][ T5909] __should_failslab+0x11a/0x160 [ 625.457163][ T5909] should_failslab+0x9/0x20 [ 625.461664][ T5909] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 625.467383][ T5909] ? __kmalloc_node_track_caller+0x3c/0x60 [ 625.473198][ T5909] __kmalloc_node_track_caller+0x3c/0x60 [ 625.478842][ T5909] ? alloc_skb_with_frags+0xb6/0x600 [ 625.484125][ T5909] __alloc_skb+0xe8/0x500 [ 625.488467][ T5909] ? validate_chain+0x92/0x7bc0 [ 625.493323][ T5909] alloc_skb_with_frags+0xb6/0x600 [ 625.498447][ T5909] sock_alloc_send_pskb+0x7cc/0xbc0 [ 625.503641][ T5909] ? __kasan_check_read+0x11/0x20 [ 625.508679][ T5909] sock_alloc_send_skb+0x32/0x40 [ 625.513624][ T5909] __ip_append_data+0x1f9c/0x31a0 [ 625.518654][ T5909] ? ip_skb_dst_mtu+0x510/0x510 [ 625.523510][ T5909] ? lock_sock_nested+0xa8/0x120 [ 625.528452][ T5909] ip_append_data+0x120/0x190 [ 625.528463][ T5909] ? ip_skb_dst_mtu+0x510/0x510 [ 625.528476][ T5909] udp_sendmsg+0x30a/0x31a0 [ 625.528485][ T5909] ? ip_skb_dst_mtu+0x510/0x510 [ 625.528517][ T5909] ? __lock_acquire+0xc75/0x1be0 [ 625.552263][ T5909] udp_sendpage+0xca/0x580 [ 625.556681][ T5909] ? read_seqcount_begin+0x12a/0x1c0 [ 625.561973][ T5909] ? udplite_getfrag+0x60/0x60 [ 625.566746][ T5909] inet_sendpage+0x16d/0x340 [ 625.571341][ T5909] ? inet_sendmsg+0x310/0x310 [ 625.576023][ T5909] sock_sendpage+0xd3/0x120 [ 625.580527][ T5909] pipe_to_sendpage+0x1f9/0x2a0 [ 625.585374][ T5909] ? sock_fasync+0x100/0x100 [ 625.585388][ T5909] __splice_from_pipe+0x2f7/0x8a0 [ 625.585400][ T5909] ? generic_splice_sendpage+0x180/0x180 [ 625.585421][ T5909] generic_splice_sendpage+0x114/0x180 [ 625.585434][ T5909] ? iter_file_splice_write+0xe20/0xe20 [ 625.611632][ T5909] direct_splice_actor+0xf7/0x130 [ 625.616664][ T5909] splice_direct_to_actor+0x463/0xac0 [ 625.622035][ T5909] ? do_splice_direct+0x330/0x330 [ 625.627069][ T5909] do_splice_direct+0x200/0x330 [ 625.631932][ T5909] ? security_file_permission+0x90/0x350 [ 625.637568][ T5909] do_sendfile+0x7e4/0xfd0 [ 625.641999][ T5909] __x64_sys_sendfile64+0x176/0x1b0 [ 625.642016][ T5909] do_syscall_64+0xf7/0x1c0 [ 625.651694][ T5909] entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:17:03 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb848000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 625.657576][ T5909] RIP: 0033:0x45a639 [ 625.657588][ T5909] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 625.657594][ T5909] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 625.657604][ T5909] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 625.657610][ T5909] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 625.657616][ T5909] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 625.657622][ T5909] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 625.657627][ T5909] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:04 executing program 1 (fault-call:15 fault-nth:21): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:04 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb8fb000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xffe7}) 07:17:04 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x763000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:04 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="50000000000000000155808c0700000027fe2f530ad98348afcb58e52c4b84321a2da77f787b6db593c2369dc0186a63fd7e1ec6ef23c19d10ac7df1c9de43ff3df83208c4950e346e0da5f38200000060000000000000003202000000000000f3944b03db88c69c0fc1ce0ffd024ac00c90b95b7e400ac6262b6d18361a761b4076c6d13dfdd4a1b2e02dfcd00483e90bf7be472ba84122085dd859f3028e0294c4a67e77ba1d5c6500000000000000980000000000000001010000fe0500007d3669587a851feb852e0883e83256dc46f818119520223552e26eaa4f00167397fe71867dbcf2947c9642b9b4c645000001000000000046dde3dc88798cdee78fc6c933310c10ea41f867af64cfd46989c2c32b2a54cfd212201e65e85fc9a8475fa243a8b455a2f47cc954bb83d5f7201de013de9997a048350b71aac438570ba671bd0000000058000000000000009300000000000000dc8e23481e258e3c1e"], 0x161}, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8953, &(0x7f0000000700)={'\x02\x00a\x00\x00\x00\x06\x00\x00\x00\a\x00', @broadcast}) 07:17:04 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, r0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x4, 0x0, [], 0x5, &(0x7f0000000280)=[{}, {}, {}, {}, {}], 0x0}, &(0x7f0000000340)=0x78) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000500)=@v1={0x2, "85"}, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000580)={r3, 0x80}, &(0x7f00000005c0)=0x8) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000240)) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) sendmsg$IPVS_CMD_GET_CONFIG(r4, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 07:17:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x1000000}) 07:17:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:04 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xbfab000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x2000000}) [ 626.266037][ T6050] FAULT_INJECTION: forcing a failure. [ 626.266037][ T6050] name failslab, interval 1, probability 0, space 0, times 0 [ 626.279129][ T6050] CPU: 0 PID: 6050 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 626.286953][ T6050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.297010][ T6050] Call Trace: [ 626.300303][ T6050] dump_stack+0x1fb/0x318 [ 626.304641][ T6050] should_fail+0x555/0x770 [ 626.309063][ T6050] __should_failslab+0x11a/0x160 [ 626.314008][ T6050] ? __nf_conntrack_alloc+0xbf/0x3d0 [ 626.319296][ T6050] should_failslab+0x9/0x20 [ 626.323792][ T6050] kmem_cache_alloc+0x56/0x2e0 [ 626.328578][ T6050] __nf_conntrack_alloc+0xbf/0x3d0 [ 626.333692][ T6050] init_conntrack+0x3ae/0x1420 [ 626.338461][ T6050] nf_conntrack_in+0x62e/0x11ad [ 626.343326][ T6050] ipv4_conntrack_local+0x123/0x1d0 [ 626.343339][ T6050] ? ipv4_conntrack_in+0x30/0x30 [ 626.353442][ T6050] nf_hook_slow+0xc8/0x210 [ 626.357857][ T6050] nf_hook+0x23a/0x310 [ 626.361923][ T6050] ? nf_hook+0x310/0x310 [ 626.366168][ T6050] ? nf_hook+0x310/0x310 [ 626.370412][ T6050] __ip_local_out+0x3c7/0x520 [ 626.375084][ T6050] ip_send_skb+0x4e/0x1e0 [ 626.375098][ T6050] udp_send_skb+0x984/0x13c0 [ 626.375124][ T6050] udp_sendpage+0x2c1/0x580 [ 626.375144][ T6050] ? udplite_getfrag+0x60/0x60 [ 626.375158][ T6050] inet_sendpage+0x16d/0x340 [ 626.397852][ T6050] ? inet_sendmsg+0x310/0x310 [ 626.402523][ T6050] sock_sendpage+0xd3/0x120 [ 626.402541][ T6050] pipe_to_sendpage+0x1f9/0x2a0 [ 626.402551][ T6050] ? sock_fasync+0x100/0x100 [ 626.402565][ T6050] __splice_from_pipe+0x2f7/0x8a0 [ 626.402577][ T6050] ? generic_splice_sendpage+0x180/0x180 [ 626.427115][ T6050] generic_splice_sendpage+0x114/0x180 [ 626.432579][ T6050] ? iter_file_splice_write+0xe20/0xe20 [ 626.438134][ T6050] direct_splice_actor+0xf7/0x130 [ 626.443161][ T6050] splice_direct_to_actor+0x463/0xac0 [ 626.448530][ T6050] ? do_splice_direct+0x330/0x330 [ 626.453601][ T6050] do_splice_direct+0x200/0x330 [ 626.458454][ T6050] ? security_file_permission+0x90/0x350 07:17:04 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc02c000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 626.464095][ T6050] do_sendfile+0x7e4/0xfd0 [ 626.468527][ T6050] __x64_sys_sendfile64+0x176/0x1b0 [ 626.473734][ T6050] do_syscall_64+0xf7/0x1c0 [ 626.478245][ T6050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.484153][ T6050] RIP: 0033:0x45a639 [ 626.488043][ T6050] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 626.507639][ T6050] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 626.516046][ T6050] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 626.524014][ T6050] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 626.531975][ T6050] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 626.531982][ T6050] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 626.531988][ T6050] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:05 executing program 1 (fault-call:15 fault-nth:22): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:05 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x3000000}) 07:17:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:05 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc0df000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:05 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, r0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x4, 0x0, [], 0x5, &(0x7f0000000280)=[{}, {}, {}, {}, {}], 0x0}, &(0x7f0000000340)=0x78) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000500)=@v1={0x2, "85"}, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000580)={r3, 0x80}, &(0x7f00000005c0)=0x8) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000240)) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) sendmsg$IPVS_CMD_GET_CONFIG(r4, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 07:17:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x4000000}) 07:17:05 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x897000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 627.152569][ T6196] FAULT_INJECTION: forcing a failure. [ 627.152569][ T6196] name failslab, interval 1, probability 0, space 0, times 0 [ 627.166873][ T6196] CPU: 1 PID: 6196 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 627.174702][ T6196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.184755][ T6196] Call Trace: [ 627.188049][ T6196] dump_stack+0x1fb/0x318 [ 627.192386][ T6196] should_fail+0x555/0x770 [ 627.196810][ T6196] __should_failslab+0x11a/0x160 [ 627.201757][ T6196] ? nf_ct_ext_add+0x35a/0x530 [ 627.206520][ T6196] should_failslab+0x9/0x20 [ 627.211022][ T6196] __kmalloc_track_caller+0x79/0x340 [ 627.216305][ T6196] __krealloc+0x89/0xb0 [ 627.220463][ T6196] nf_ct_ext_add+0x35a/0x530 [ 627.225058][ T6196] init_conntrack+0x6ce/0x1420 [ 627.229917][ T6196] nf_conntrack_in+0x62e/0x11ad [ 627.234791][ T6196] ipv4_conntrack_local+0x123/0x1d0 [ 627.239992][ T6196] ? ipv4_conntrack_in+0x30/0x30 [ 627.244926][ T6196] nf_hook_slow+0xc8/0x210 [ 627.249615][ T6196] nf_hook+0x23a/0x310 [ 627.253676][ T6196] ? nf_hook+0x310/0x310 [ 627.257916][ T6196] ? nf_hook+0x310/0x310 [ 627.262167][ T6196] __ip_local_out+0x3c7/0x520 [ 627.266841][ T6196] ip_send_skb+0x4e/0x1e0 [ 627.271219][ T6196] udp_send_skb+0x984/0x13c0 [ 627.275831][ T6196] udp_sendpage+0x2c1/0x580 [ 627.280350][ T6196] ? udplite_getfrag+0x60/0x60 [ 627.285119][ T6196] inet_sendpage+0x16d/0x340 [ 627.289711][ T6196] ? inet_sendmsg+0x310/0x310 [ 627.294392][ T6196] sock_sendpage+0xd3/0x120 [ 627.298904][ T6196] pipe_to_sendpage+0x1f9/0x2a0 [ 627.303758][ T6196] ? sock_fasync+0x100/0x100 [ 627.308351][ T6196] __splice_from_pipe+0x2f7/0x8a0 [ 627.313379][ T6196] ? generic_splice_sendpage+0x180/0x180 [ 627.319027][ T6196] generic_splice_sendpage+0x114/0x180 [ 627.324487][ T6196] ? iter_file_splice_write+0xe20/0xe20 [ 627.330034][ T6196] direct_splice_actor+0xf7/0x130 [ 627.335065][ T6196] splice_direct_to_actor+0x463/0xac0 [ 627.340430][ T6196] ? do_splice_direct+0x330/0x330 [ 627.345468][ T6196] do_splice_direct+0x200/0x330 [ 627.350318][ T6196] ? security_file_permission+0x90/0x350 [ 627.355947][ T6196] do_sendfile+0x7e4/0xfd0 [ 627.360380][ T6196] __x64_sys_sendfile64+0x176/0x1b0 [ 627.365586][ T6196] do_syscall_64+0xf7/0x1c0 [ 627.370090][ T6196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.375979][ T6196] RIP: 0033:0x45a639 [ 627.379869][ T6196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 627.399473][ T6196] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 627.407881][ T6196] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 627.415852][ T6196] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 627.423821][ T6196] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 627.431786][ T6196] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 627.439755][ T6196] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 [ 627.447904][ C1] net_ratelimit: 23 callbacks suppressed 07:17:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x5000000}) 07:17:05 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc78f000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 627.447910][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 627.459340][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 627.465186][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 627.471037][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 627.476872][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 627.482651][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 627.491603][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 627.744158][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 627.749987][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:17:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:06 executing program 3: perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) 07:17:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x6000000}) 07:17:06 executing program 1 (fault-call:15 fault-nth:23): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:06 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc805000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:06 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x900000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 627.824198][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:17:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x7000000}) 07:17:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001100)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\x01\x83Z\xc4\x06S$\ah\x93\xff\xf7Z\xcb\v1\xf2\xc4\x85\x85\xa6\xfa\x15\x10\xa8\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xd5\x12\xc7\x1ee\x86\xcc\xdb/\xc5\x97\xea\x93\xa7\xde\xc9u\xb1\x9f\xce\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|h$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3We\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xfb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xfc\xe1\t]\x84J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17\x85\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?2,\x89\xb1%p\x8a\r\f\xe0,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa[\xa7\x02\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\xd1`\x88\xf4K\xe7\x80\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\t\x91\xa3\"\x85H@\xb9\x97\bZ\xa5(S\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\xbc\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6\xaa`\x88\x8a\xf4u$\x17\xff\xdbR\x02\xe8V\xdc\xb8]F\xdap\xf7\xdf~G\xe1\xe8\xd2\xe6\x1d\x9b/\xd8\x93F\xcf\xae]\xbb\xa6\x85\x1d/\xef\xf8\xfb>\x9e{\\\x1e\xf1i~\xee\xbb\x1e\x93SN\nA\x99\xd8\xa1y\x185\x86\xbe\x1eU\x9b4\xeem\xaa\xae\x1b\xb09\x9f.\xa3\xc0\xe6C\xc8~\xd8\x95f\xfbF\x05\xb9\xbde\n\x82\x91\r\xf0\x16\xbe[\x00H\x96\x7f8\x7fx\x06\xe9\x0fa\xfa\x1eg)\xc1vaG=a\xf10\x04rw\x0f\xbb%\xc6f\x81\xbaEO\x80\xc3Tc\xc4\xc0\x14\t#2\xd8\xe8\xecX4H\xf0\xc3\'\xba[\xd3}\x16\xa3\xf3\n\x00\xdd\xf3\x81\xaa\x99\xcb(\xb2\x19C\xe4\xc9\x87\x9a\x8c\xbd\xa0\x9cW\a\xb6\xc2R\xabn\xf2', 0x2761, 0x0) r1 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500"}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffffffffffe52) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300)=r0, 0x4) 07:17:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:06 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc810000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 628.096424][ T6440] FAULT_INJECTION: forcing a failure. [ 628.096424][ T6440] name failslab, interval 1, probability 0, space 0, times 0 [ 628.109247][ T6440] CPU: 1 PID: 6440 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 628.117067][ T6440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.127123][ T6440] Call Trace: [ 628.130418][ T6440] dump_stack+0x1fb/0x318 [ 628.134746][ T6440] should_fail+0x555/0x770 [ 628.134766][ T6440] __should_failslab+0x11a/0x160 [ 628.134780][ T6440] should_failslab+0x9/0x20 [ 628.134790][ T6440] kmem_cache_alloc_node+0x65/0x280 [ 628.134800][ T6440] ? __alloc_skb+0x9f/0x500 [ 628.134810][ T6440] ? rcu_lock_release+0x26/0x30 [ 628.134825][ T6440] __alloc_skb+0x9f/0x500 [ 628.134842][ T6440] ip_frag_next+0xde/0x9f0 [ 628.134856][ T6440] ? ip_skb_dst_mtu+0x307/0x510 [ 628.134867][ T6440] ip_do_fragment+0x8c6/0x1e60 [ 628.134880][ T6440] ? ip_fragment+0x210/0x210 [ 628.144222][ T6440] ? rcu_lock_release+0x26/0x30 [ 628.144250][ T6440] ip_fragment+0x11f/0x210 [ 628.144263][ T6440] __ip_finish_output+0x3fc/0x4b0 [ 628.144276][ T6440] ip_finish_output+0x52/0x1e0 [ 628.144283][ T6440] ? ip_output+0x17e/0x270 [ 628.144294][ T6440] ip_output+0x1bc/0x270 [ 628.144307][ T6440] ip_send_skb+0x126/0x1e0 [ 628.144322][ T6440] udp_send_skb+0x984/0x13c0 [ 628.176844][ T6440] udp_sendpage+0x2c1/0x580 [ 628.176864][ T6440] ? udplite_getfrag+0x60/0x60 [ 628.176878][ T6440] inet_sendpage+0x16d/0x340 [ 628.186201][ T6440] ? inet_sendmsg+0x310/0x310 [ 628.186215][ T6440] sock_sendpage+0xd3/0x120 07:17:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:06 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xa00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 628.186231][ T6440] pipe_to_sendpage+0x1f9/0x2a0 [ 628.186240][ T6440] ? sock_fasync+0x100/0x100 [ 628.186253][ T6440] __splice_from_pipe+0x2f7/0x8a0 [ 628.186266][ T6440] ? generic_splice_sendpage+0x180/0x180 [ 628.186288][ T6440] generic_splice_sendpage+0x114/0x180 [ 628.186304][ T6440] ? iter_file_splice_write+0xe20/0xe20 [ 628.232110][ T6440] direct_splice_actor+0xf7/0x130 [ 628.250651][ T6440] splice_direct_to_actor+0x463/0xac0 [ 628.250660][ T6440] ? do_splice_direct+0x330/0x330 [ 628.250685][ T6440] do_splice_direct+0x200/0x330 [ 628.297033][ T6440] ? security_file_permission+0x90/0x350 [ 628.302656][ T6440] do_sendfile+0x7e4/0xfd0 [ 628.307087][ T6440] __x64_sys_sendfile64+0x176/0x1b0 [ 628.312292][ T6440] do_syscall_64+0xf7/0x1c0 [ 628.316798][ T6440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.322714][ T6440] RIP: 0033:0x45a639 [ 628.326604][ T6440] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.346200][ T6440] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 628.354604][ T6440] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 628.362569][ T6440] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 628.370534][ T6440] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 628.378501][ T6440] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 628.386473][ T6440] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:06 executing program 1 (fault-call:15 fault-nth:24): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:06 executing program 3: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:17:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x8000000}) 07:17:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:06 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc8c3000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:06 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xb00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x9000000}) 07:17:07 executing program 3: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 628.975638][ T6683] FAULT_INJECTION: forcing a failure. [ 628.975638][ T6683] name failslab, interval 1, probability 0, space 0, times 0 [ 628.988464][ T6683] CPU: 1 PID: 6683 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 628.996283][ T6683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.006336][ T6683] Call Trace: [ 629.009633][ T6683] dump_stack+0x1fb/0x318 [ 629.013968][ T6683] should_fail+0x555/0x770 [ 629.018387][ T6683] __should_failslab+0x11a/0x160 [ 629.023310][ T6683] should_failslab+0x9/0x20 [ 629.027808][ T6683] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 629.033521][ T6683] ? __kmalloc_node_track_caller+0x3c/0x60 [ 629.039325][ T6683] __kmalloc_node_track_caller+0x3c/0x60 [ 629.044947][ T6683] ? ip_frag_next+0xde/0x9f0 [ 629.044962][ T6683] __alloc_skb+0xe8/0x500 [ 629.044977][ T6683] ip_frag_next+0xde/0x9f0 [ 629.044996][ T6683] ? ip_skb_dst_mtu+0x307/0x510 [ 629.058282][ T6683] ip_do_fragment+0x8c6/0x1e60 [ 629.058292][ T6683] ? ip_fragment+0x210/0x210 07:17:07 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xcf73000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:07 executing program 3: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 629.058304][ T6683] ? rcu_lock_release+0x26/0x30 [ 629.077307][ T6683] ip_fragment+0x11f/0x210 [ 629.081723][ T6683] __ip_finish_output+0x3fc/0x4b0 [ 629.086748][ T6683] ip_finish_output+0x52/0x1e0 [ 629.091644][ T6683] ? ip_output+0x17e/0x270 [ 629.096053][ T6683] ip_output+0x1bc/0x270 [ 629.096068][ T6683] ip_send_skb+0x126/0x1e0 [ 629.096081][ T6683] udp_send_skb+0x984/0x13c0 [ 629.096105][ T6683] udp_sendpage+0x2c1/0x580 [ 629.104753][ T6683] ? udplite_getfrag+0x60/0x60 [ 629.104766][ T6683] inet_sendpage+0x16d/0x340 [ 629.104778][ T6683] ? inet_sendmsg+0x310/0x310 [ 629.104792][ T6683] sock_sendpage+0xd3/0x120 [ 629.132555][ T6683] pipe_to_sendpage+0x1f9/0x2a0 [ 629.137407][ T6683] ? sock_fasync+0x100/0x100 [ 629.142003][ T6683] __splice_from_pipe+0x2f7/0x8a0 [ 629.147028][ T6683] ? generic_splice_sendpage+0x180/0x180 [ 629.152671][ T6683] generic_splice_sendpage+0x114/0x180 [ 629.158128][ T6683] ? iter_file_splice_write+0xe20/0xe20 [ 629.158142][ T6683] direct_splice_actor+0xf7/0x130 [ 629.158157][ T6683] splice_direct_to_actor+0x463/0xac0 [ 629.158167][ T6683] ? do_splice_direct+0x330/0x330 [ 629.158190][ T6683] do_splice_direct+0x200/0x330 [ 629.168738][ T6683] ? security_file_permission+0x90/0x350 [ 629.168753][ T6683] do_sendfile+0x7e4/0xfd0 [ 629.168780][ T6683] __x64_sys_sendfile64+0x176/0x1b0 [ 629.168798][ T6683] do_syscall_64+0xf7/0x1c0 [ 629.168813][ T6683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.168826][ T6683] RIP: 0033:0x45a639 [ 629.194623][ T6683] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 629.194629][ T6683] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 629.194640][ T6683] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 629.194646][ T6683] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 629.194652][ T6683] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 629.194658][ T6683] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 629.194664][ T6683] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:07 executing program 1 (fault-call:15 fault-nth:25): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:07 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xc00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xa000000}) 07:17:07 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)={0x0, 0x0}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xfffffffffffeffff}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) sendto$inet(r0, &(0x7f0000000400)="f62ab313949355e0273e65d3abda21f068933ec46b1fdf41a833e981e7de5b6aa4a1b65d8ec8094ee099d8271d26428366e221fc061208889c5686a4dc0c2d3d4fd66741cc11c4c833102fc156857f99a8b799636ea87c35b0283036520e5953baf9c51316d8d93aa5096030bd0d0dfbbdf445006af75ad33303c89c2de7ee8ac49a59a6605f3343c51ee399b1977da2e34ffbe0425866c7b7ad499ab8611286d60c0f27a1e62be4fb4b9e41eabec273531810fb81d733a5ea29408c19aba4587f9da5920ad564ad6bb89ac4565194535c7f6f54993deceb58a75e137be85d7600", 0xffffff90, 0x60, 0x0, 0x127) 07:17:07 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd0a7000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, 0x0, 0x0) 07:17:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xb000000}) 07:17:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, 0x0, 0x0) [ 629.820535][ T6820] FAULT_INJECTION: forcing a failure. [ 629.820535][ T6820] name failslab, interval 1, probability 0, space 0, times 0 [ 629.833564][ T6820] CPU: 0 PID: 6820 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 629.841366][ T6820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.851417][ T6820] Call Trace: [ 629.854712][ T6820] dump_stack+0x1fb/0x318 [ 629.859045][ T6820] should_fail+0x555/0x770 [ 629.863473][ T6820] __should_failslab+0x11a/0x160 07:17:08 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd757000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xc000000}) [ 629.868402][ T6820] ? skb_clone+0x1cc/0x380 [ 629.868440][ T6820] should_failslab+0x9/0x20 [ 629.868449][ T6820] kmem_cache_alloc+0x56/0x2e0 [ 629.868459][ T6820] ? check_preemption_disabled+0x47/0x2a0 [ 629.868470][ T6820] skb_clone+0x1cc/0x380 [ 629.868486][ T6820] dev_queue_xmit_nit+0x305/0xaa0 [ 629.868503][ T6820] ? validate_xmit_xfrm+0x58/0xe00 [ 629.868516][ T6820] dev_hard_start_xmit+0x12c/0x3f0 [ 629.868534][ T6820] __dev_queue_xmit+0x1e53/0x3010 [ 629.877439][ T6820] ? ip_finish_output2+0x10b5/0x18d0 [ 629.877448][ T6820] ? ip_finish_output2+0x11ee/0x18d0 [ 629.877461][ T6820] dev_queue_xmit+0x17/0x20 [ 629.927340][ T6820] ip_finish_output2+0x145c/0x18d0 [ 629.932461][ T6820] ip_do_fragment+0x99a/0x1e60 [ 629.937216][ T6820] ? ip_fragment+0x210/0x210 [ 629.937227][ T6820] ? rcu_lock_release+0x26/0x30 [ 629.937256][ T6820] ip_fragment+0x11f/0x210 [ 629.937270][ T6820] __ip_finish_output+0x3fc/0x4b0 [ 629.937294][ T6820] ip_finish_output+0x52/0x1e0 [ 629.937301][ T6820] ? ip_output+0x17e/0x270 [ 629.937315][ T6820] ip_output+0x1bc/0x270 [ 629.951138][ T6820] ip_send_skb+0x126/0x1e0 [ 629.951152][ T6820] udp_send_skb+0x984/0x13c0 [ 629.951176][ T6820] udp_sendpage+0x2c1/0x580 [ 629.983037][ T6820] ? udplite_getfrag+0x60/0x60 [ 629.987816][ T6820] inet_sendpage+0x16d/0x340 [ 629.992409][ T6820] ? inet_sendmsg+0x310/0x310 [ 629.997079][ T6820] sock_sendpage+0xd3/0x120 [ 630.001583][ T6820] pipe_to_sendpage+0x1f9/0x2a0 [ 630.006429][ T6820] ? sock_fasync+0x100/0x100 [ 630.011025][ T6820] __splice_from_pipe+0x2f7/0x8a0 [ 630.016138][ T6820] ? generic_splice_sendpage+0x180/0x180 [ 630.021788][ T6820] generic_splice_sendpage+0x114/0x180 [ 630.027261][ T6820] ? iter_file_splice_write+0xe20/0xe20 [ 630.032810][ T6820] direct_splice_actor+0xf7/0x130 [ 630.037838][ T6820] splice_direct_to_actor+0x463/0xac0 [ 630.043208][ T6820] ? do_splice_direct+0x330/0x330 [ 630.048250][ T6820] do_splice_direct+0x200/0x330 [ 630.053111][ T6820] ? security_file_permission+0x90/0x350 [ 630.058746][ T6820] do_sendfile+0x7e4/0xfd0 [ 630.063182][ T6820] __x64_sys_sendfile64+0x176/0x1b0 07:17:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, 0x0, 0x0) [ 630.068388][ T6820] do_syscall_64+0xf7/0x1c0 [ 630.072889][ T6820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.078796][ T6820] RIP: 0033:0x45a639 [ 630.082690][ T6820] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.102292][ T6820] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 630.110699][ T6820] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 07:17:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xd000000}) [ 630.118678][ T6820] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 630.126775][ T6820] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 630.134747][ T6820] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 630.142716][ T6820] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:08 executing program 1 (fault-call:15 fault-nth:26): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:08 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)={0x0, 0x0}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xfffffffffffeffff}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x2000000004e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) sendto$inet(r0, &(0x7f0000000400)="f62ab313949355e0273e65d3abda21f068933ec46b1fdf41a833e981e7de5b6aa4a1b65d8ec8094ee099d8271d26428366e221fc061208889c5686a4dc0c2d3d4fd66741cc11c4c833102fc156857f99a8b799636ea87c35b0283036520e5953baf9c51316d8d93aa5096030bd0d0dfbbdf445006af75ad33303c89c2de7ee8ac49a59a6605f3343c51ee399b1977da2e34ffbe0425866c7b7ad499ab8611286d60c0f27a1e62be4fb4b9e41eabec273531810fb81d733a5ea29408c19aba4587f9da5920ad564ad6bb89ac4565194535c7f6f54993deceb58a75e137be85d7600", 0xffffff90, 0x60, 0x0, 0x127) 07:17:08 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:08 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd804000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[], 0x0) 07:17:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xe000000}) 07:17:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x10000000}) 07:17:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 630.715801][ T7028] FAULT_INJECTION: forcing a failure. [ 630.715801][ T7028] name failslab, interval 1, probability 0, space 0, times 0 [ 630.728584][ T7028] CPU: 1 PID: 7028 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 630.736405][ T7028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.746463][ T7028] Call Trace: [ 630.749766][ T7028] dump_stack+0x1fb/0x318 [ 630.754131][ T7028] should_fail+0x555/0x770 [ 630.758551][ T7028] __should_failslab+0x11a/0x160 [ 630.763480][ T7028] should_failslab+0x9/0x20 [ 630.767978][ T7028] kmem_cache_alloc_node+0x65/0x280 [ 630.773174][ T7028] ? __alloc_skb+0x9f/0x500 [ 630.777679][ T7028] ? local_bh_enable+0x9/0x30 [ 630.782361][ T7028] __alloc_skb+0x9f/0x500 [ 630.786692][ T7028] ? mark_lock+0x107/0x1650 [ 630.791203][ T7028] ? __local_bh_enable_ip+0x17d/0x240 [ 630.796576][ T7028] ip_frag_next+0xde/0x9f0 [ 630.800991][ T7028] ? ip_finish_output2+0x14cf/0x18d0 [ 630.806315][ T7028] ip_do_fragment+0x8c6/0x1e60 [ 630.811077][ T7028] ? ip_fragment+0x210/0x210 [ 630.815663][ T7028] ? rcu_lock_release+0x26/0x30 [ 630.820516][ T7028] ip_fragment+0x11f/0x210 [ 630.824932][ T7028] __ip_finish_output+0x3fc/0x4b0 [ 630.829960][ T7028] ip_finish_output+0x52/0x1e0 [ 630.834722][ T7028] ? ip_output+0x17e/0x270 [ 630.839139][ T7028] ip_output+0x1bc/0x270 [ 630.843386][ T7028] ip_send_skb+0x126/0x1e0 [ 630.847804][ T7028] udp_send_skb+0x984/0x13c0 [ 630.852411][ T7028] udp_sendpage+0x2c1/0x580 [ 630.856925][ T7028] ? udplite_getfrag+0x60/0x60 [ 630.861691][ T7028] inet_sendpage+0x16d/0x340 [ 630.866282][ T7028] ? inet_sendmsg+0x310/0x310 [ 630.870969][ T7028] sock_sendpage+0xd3/0x120 [ 630.875478][ T7028] pipe_to_sendpage+0x1f9/0x2a0 [ 630.880328][ T7028] ? sock_fasync+0x100/0x100 [ 630.885008][ T7028] __splice_from_pipe+0x2f7/0x8a0 [ 630.890032][ T7028] ? generic_splice_sendpage+0x180/0x180 [ 630.895685][ T7028] generic_splice_sendpage+0x114/0x180 [ 630.895699][ T7028] ? iter_file_splice_write+0xe20/0xe20 [ 630.895714][ T7028] direct_splice_actor+0xf7/0x130 [ 630.911704][ T7028] splice_direct_to_actor+0x463/0xac0 [ 630.917077][ T7028] ? do_splice_direct+0x330/0x330 [ 630.922114][ T7028] do_splice_direct+0x200/0x330 [ 630.926965][ T7028] ? security_file_permission+0x90/0x350 [ 630.926980][ T7028] do_sendfile+0x7e4/0xfd0 [ 630.927007][ T7028] __x64_sys_sendfile64+0x176/0x1b0 [ 630.942210][ T7028] do_syscall_64+0xf7/0x1c0 [ 630.946720][ T7028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.952614][ T7028] RIP: 0033:0x45a639 [ 630.956502][ T7028] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.976103][ T7028] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 630.984514][ T7028] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 630.992491][ T7028] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 631.000451][ T7028] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 631.000461][ T7028] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 07:17:08 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xd88b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:09 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, 0x0) 07:17:09 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xdf3b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:09 executing program 3: [ 631.016378][ T7028] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:09 executing program 1 (fault-call:15 fault-nth:27): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:09 executing program 3: 07:17:09 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xdfee000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x11000000}) 07:17:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[], 0x0) 07:17:09 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x12000000}) 07:17:09 executing program 3: 07:17:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 07:17:09 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe06f000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 631.583458][ T7207] FAULT_INJECTION: forcing a failure. [ 631.583458][ T7207] name failslab, interval 1, probability 0, space 0, times 0 [ 631.596777][ T7207] CPU: 0 PID: 7207 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 631.604604][ T7207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.614655][ T7207] Call Trace: [ 631.617949][ T7207] dump_stack+0x1fb/0x318 [ 631.622298][ T7207] should_fail+0x555/0x770 [ 631.626734][ T7207] __should_failslab+0x11a/0x160 07:17:09 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe0ffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 631.631683][ T7207] should_failslab+0x9/0x20 [ 631.636187][ T7207] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 631.641906][ T7207] ? __kmalloc_node_track_caller+0x3c/0x60 [ 631.647717][ T7207] __kmalloc_node_track_caller+0x3c/0x60 [ 631.653346][ T7207] ? ip_frag_next+0xde/0x9f0 [ 631.657934][ T7207] __alloc_skb+0xe8/0x500 [ 631.662265][ T7207] ? __local_bh_enable_ip+0x17d/0x240 [ 631.667629][ T7207] ip_frag_next+0xde/0x9f0 [ 631.672040][ T7207] ? ip_finish_output2+0x14cf/0x18d0 [ 631.677328][ T7207] ip_do_fragment+0x8c6/0x1e60 07:17:09 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe71f000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 631.682090][ T7207] ? ip_fragment+0x210/0x210 [ 631.686686][ T7207] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 631.692507][ T7207] ip_fragment+0x11f/0x210 [ 631.696924][ T7207] __ip_finish_output+0x3fc/0x4b0 [ 631.701945][ T7207] ip_finish_output+0x52/0x1e0 [ 631.706699][ T7207] ? ip_output+0x17e/0x270 [ 631.711110][ T7207] ip_output+0x1bc/0x270 [ 631.715352][ T7207] ip_send_skb+0x126/0x1e0 [ 631.719765][ T7207] udp_send_skb+0x984/0x13c0 [ 631.724368][ T7207] udp_sendpage+0x2c1/0x580 [ 631.728877][ T7207] ? udplite_getfrag+0x60/0x60 [ 631.733639][ T7207] inet_sendpage+0x16d/0x340 [ 631.738323][ T7207] ? inet_sendmsg+0x310/0x310 [ 631.743001][ T7207] sock_sendpage+0xd3/0x120 [ 631.747508][ T7207] pipe_to_sendpage+0x1f9/0x2a0 [ 631.752354][ T7207] ? sock_fasync+0x100/0x100 [ 631.756948][ T7207] __splice_from_pipe+0x2f7/0x8a0 [ 631.762405][ T7207] ? generic_splice_sendpage+0x180/0x180 [ 631.768048][ T7207] generic_splice_sendpage+0x114/0x180 [ 631.773529][ T7207] ? iter_file_splice_write+0xe20/0xe20 [ 631.779068][ T7207] direct_splice_actor+0xf7/0x130 [ 631.779086][ T7207] splice_direct_to_actor+0x463/0xac0 [ 631.789444][ T7207] ? do_splice_direct+0x330/0x330 [ 631.789470][ T7207] do_splice_direct+0x200/0x330 [ 631.789486][ T7207] ? security_file_permission+0x90/0x350 [ 631.804933][ T7207] do_sendfile+0x7e4/0xfd0 [ 631.809364][ T7207] __x64_sys_sendfile64+0x176/0x1b0 [ 631.814572][ T7207] do_syscall_64+0xf7/0x1c0 [ 631.819076][ T7207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.824964][ T7207] RIP: 0033:0x45a639 [ 631.828852][ T7207] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.848443][ T7207] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 631.856826][ T7207] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 631.864770][ T7207] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 631.872755][ T7207] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 631.881311][ T7207] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 631.889473][ T7207] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 07:17:10 executing program 1 (fault-call:15 fault-nth:28): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 07:17:10 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe7d2000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:10 executing program 3: 07:17:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x25000000}) 07:17:10 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:10 executing program 3: 07:17:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 07:17:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x40000000}) 07:17:10 executing program 3: 07:17:10 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf47000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 632.497735][ T7347] FAULT_INJECTION: forcing a failure. [ 632.497735][ T7347] name failslab, interval 1, probability 0, space 0, times 0 [ 632.510451][ T7347] CPU: 1 PID: 7347 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 632.518249][ T7347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.528302][ T7347] Call Trace: [ 632.531595][ T7347] dump_stack+0x1fb/0x318 [ 632.535939][ T7347] should_fail+0x555/0x770 [ 632.540363][ T7347] __should_failslab+0x11a/0x160 [ 632.545304][ T7347] ? skb_clone+0x1cc/0x380 [ 632.549717][ T7347] should_failslab+0x9/0x20 [ 632.554213][ T7347] kmem_cache_alloc+0x56/0x2e0 [ 632.558959][ T7347] ? check_preemption_disabled+0x47/0x2a0 [ 632.564673][ T7347] skb_clone+0x1cc/0x380 [ 632.568908][ T7347] dev_queue_xmit_nit+0x305/0xaa0 [ 632.573921][ T7347] ? validate_xmit_xfrm+0x58/0xe00 [ 632.579030][ T7347] dev_hard_start_xmit+0x12c/0x3f0 [ 632.584148][ T7347] __dev_queue_xmit+0x1e53/0x3010 [ 632.589184][ T7347] ? ip_finish_output2+0x10b5/0x18d0 [ 632.594464][ T7347] ? ip_finish_output2+0x11ee/0x18d0 [ 632.599751][ T7347] dev_queue_xmit+0x17/0x20 [ 632.604249][ T7347] ip_finish_output2+0x145c/0x18d0 [ 632.609371][ T7347] ip_do_fragment+0x99a/0x1e60 [ 632.614131][ T7347] ? ip_fragment+0x210/0x210 [ 632.618715][ T7347] ? rcu_lock_release+0x26/0x30 [ 632.623583][ T7347] ip_fragment+0x11f/0x210 [ 632.628000][ T7347] __ip_finish_output+0x3fc/0x4b0 [ 632.633024][ T7347] ip_finish_output+0x52/0x1e0 [ 632.637784][ T7347] ? ip_output+0x17e/0x270 [ 632.642197][ T7347] ip_output+0x1bc/0x270 [ 632.646436][ T7347] ip_send_skb+0x126/0x1e0 [ 632.650840][ T7347] udp_send_skb+0x984/0x13c0 [ 632.655437][ T7347] udp_sendpage+0x2c1/0x580 [ 632.659937][ T7347] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 632.665389][ T7347] ? udplite_getfrag+0x60/0x60 [ 632.670150][ T7347] inet_sendpage+0x16d/0x340 [ 632.674736][ T7347] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 632.680191][ T7347] ? inet_sendmsg+0x310/0x310 [ 632.688337][ T7347] sock_sendpage+0xd3/0x120 [ 632.692842][ T7347] pipe_to_sendpage+0x1f9/0x2a0 [ 632.697701][ T7347] ? sock_fasync+0x100/0x100 [ 632.702295][ T7347] __splice_from_pipe+0x2f7/0x8a0 [ 632.707322][ T7347] ? generic_splice_sendpage+0x180/0x180 [ 632.712966][ T7347] generic_splice_sendpage+0x114/0x180 [ 632.718424][ T7347] ? iter_file_splice_write+0xe20/0xe20 [ 632.723966][ T7347] direct_splice_actor+0xf7/0x130 [ 632.728985][ T7347] splice_direct_to_actor+0x463/0xac0 [ 632.734337][ T7347] ? do_splice_direct+0x330/0x330 [ 632.734362][ T7347] do_splice_direct+0x200/0x330 07:17:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x5c000000}) [ 632.734378][ T7347] ? security_file_permission+0x90/0x350 [ 632.749867][ T7347] do_sendfile+0x7e4/0xfd0 [ 632.754293][ T7347] __x64_sys_sendfile64+0x176/0x1b0 [ 632.754309][ T7347] do_syscall_64+0xf7/0x1c0 [ 632.754323][ T7347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.764090][ T7347] RIP: 0033:0x45a639 [ 632.764099][ T7347] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.764105][ T7347] RSP: 002b:00007f5158cbcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 632.764115][ T7347] RAX: ffffffffffffffda RBX: 00007f5158cbcc90 RCX: 000000000045a639 [ 632.764120][ T7347] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000006 [ 632.764126][ T7347] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 632.764134][ T7347] R10: 000000000000ffe4 R11: 0000000000000246 R12: 00007f5158cbd6d4 [ 632.833687][ T7347] R13: 00000000004c83bf R14: 00000000004de7f0 R15: 0000000000000008 [ 632.841918][ C1] net_ratelimit: 22 callbacks suppressed [ 632.841927][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:17:11 executing program 1 (fault-call:15 fault-nth:29): prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xe7ffffff}) 07:17:11 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe803000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:11 executing program 3: 07:17:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c02000000000000000144100511660100"], 0x1c) 07:17:11 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffa000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:11 executing program 3: 07:17:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c02000000000000000144100511660100"], 0x1c) 07:17:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xfdfdffff}) 07:17:11 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xe853000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:11 executing program 3: [ 633.376899][ C0] IPv4: Oversized IP packet from 127.0.0.1 07:17:11 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 633.664176][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 633.669955][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 633.675760][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 633.681495][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 633.687297][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 633.693035][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:17:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xfffffdfd}) 07:17:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c02000000000000000144100511660100"], 0x1c) 07:17:12 executing program 3: 07:17:12 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xef03000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:12 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x107b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:12 executing program 3: 07:17:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b"], 0x2a) 07:17:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xffffffe7}) 07:17:12 executing program 3: 07:17:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b"], 0x2a) 07:17:12 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1100000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 634.283101][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 634.304164][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:17:13 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xefb6000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0xffffffff}) 07:17:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b"], 0x2a) 07:17:13 executing program 3: 07:17:13 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1200000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:13 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0x7ffff000) 07:17:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500"}) 07:17:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800000000"], 0x31) 07:17:13 executing program 3: 07:17:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x2]}) 07:17:13 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf037000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:13 executing program 3: 07:17:13 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x172b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x3]}) 07:17:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800000000"], 0x31) 07:17:13 executing program 3: 07:17:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x4]}) 07:17:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0x7fffffffffffffff) 07:17:14 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf0ea000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800000000"], 0x31) 07:17:14 executing program 3: 07:17:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x5]}) 07:17:14 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x17de000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:14 executing program 3: 07:17:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b0000080000000000000000"], 0x35) 07:17:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x6]}) 07:17:14 executing program 3: 07:17:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b0000080000000000000000"], 0x35) 07:17:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x7]}) 07:17:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1ff, 0x4000) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000340)={"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"}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) r5 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x5, 0x100) bind$bt_l2cap(r5, &(0x7f0000000280)={0x1f, 0x6, {0x9, 0x5, 0x14, 0x80, 0xaa, 0x7f}, 0x80, 0x7}, 0xe) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r7, 0x40000) setsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r6, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r6, r7, 0x0, 0xffe4) 07:17:14 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf401000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:14 executing program 3: 07:17:14 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x185f000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b0000080000000000000000"], 0x35) 07:17:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x8]}) 07:17:15 executing program 3: 07:17:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x9]}) 07:17:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/55], 0x37) 07:17:15 executing program 3: 07:17:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xa]}) 07:17:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/55], 0x37) 07:17:15 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf5ffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:15 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1f0f000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xb]}) 07:17:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/55], 0x37) 07:17:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x20000000000000e2, &(0x7f0000000280)=[{0x8417, 0x7, 0x79, 0x3}, {0xed06, 0x20, 0x8, 0x1}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x100, @loopback}, 0x10) openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x10000, 0x0) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2842, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r7, 0x2, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x2000}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffff81}]) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r11, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r11, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r12, 0x9}, 0x8) r13 = socket$inet(0x2, 0x4000000805, 0x0) r14 = socket$inet_sctp(0x2, 0x5, 0x84) r15 = dup3(r13, r14, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r15, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r15, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r16 = socket$inet(0x2, 0x4000000805, 0x0) r17 = socket$inet_sctp(0x2, 0x5, 0x84) r18 = dup3(r16, r17, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r18, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r18, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r19 = socket$inet(0x2, 0x4000000805, 0x0) r20 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r19, r20, 0x0) r21 = socket$inet(0x2, 0x4000000805, 0x0) r22 = socket$inet_sctp(0x2, 0x5, 0x84) r23 = dup3(r21, r22, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r23, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r23, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) r24 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm-control\x00', 0x21c2368c7f4775bf, 0x0) r25 = accept4$x25(r3, 0x0, &(0x7f0000001600), 0x7678ed86ef632943) io_submit(r7, 0x6, &(0x7f0000001700)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x761ea93150b976d0, 0x1, r8, &(0x7f0000000100)="4074d32c3d0a0fc4156d5203aa378441ad5e7f03d37c02935a897ea8223ef6a411a7ea6b5cc190fe3f6d6fc50738e78a64b34bca1d039210", 0x38, 0x2eb02e068000, 0x0, 0x0, r15}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x6e, 0xffffffffffffffff, &(0x7f0000000340)="5b6289ced0ad77f82a885749e8125ed7642430455bc260ce408f23ed248e08e7f85094204648148ccccd16dcb7094d92af3689c4558c1ec665da444486db6056ba6bd2483028043751d16f0d94acbe709f91415fd8739a1fcee1969240b7b1c66e59e6c4fdf8aad418b43431a02ed7521ac9933575508c7c8c4c288c0c29cad5e602c2bcbde7aec2484908d7fffccd82b93f329f05605a8e5f09f6e2bf27362aa60036e948dfe6926ba9767efba964d461e0e2", 0xb3, 0x6a1, 0x0, 0x7d0daab515b655c7, r18}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x9, 0x1, r19, &(0x7f0000000400)="b17971b6eaf3b8934f547a4f81f717bbc49abf4c932231eff8bcd1115c097ed7152d02564d34f5fb3a93165463692652a791740b79f96e91bf8aff970e4128608b8210fc365ccba201a573d6b2115d3cb24a16b78719c31cf1124a195492f51ce33b0193a31e426a046347d9bd52b304e6d329283c6b30453a571d3dc680a65449d1a0e0cef1f35ca082bd2ee18b965a", 0x90, 0x0, 0x0, 0x3, r23}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x7, 0x90d9, r24, &(0x7f0000000540)="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", 0x1000, 0x100000000, 0x0, 0x2}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x6, 0xff, r3, &(0x7f0000001580)="2279b70a5de0c12d41cabff92a", 0xd, 0x4, 0x0, 0x0, r3}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0xc, 0x1, r25, &(0x7f0000001640)="80f10de41d86ed99b4e1510d2af083ffd7fea7e1002bcd238cff1186f2437e76d02395adf70d9a34d08d27f823c65651136f66fd7ab64b6910dceb8666f8a73a0d8e44076ea1d272077e299ef641929677b3b89f5e5c637e1768c6d77f8bafe88348da2f256e48ed3a95f911f052386fcb6f57c1c51406102c5c", 0x7a, 0xfffffffffffffffa, 0x0, 0x1}]) sendfile(r4, r5, 0x0, 0xffe4) 07:17:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x375, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000200000a1f0000030028080008001800e95f0020280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 07:17:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xc]}) 07:17:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x1fc2000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 637.872045][ T8668] encrypted_key: insufficient parameters specified 07:17:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001100)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\x01\x83Z\xc4\x06S$\ah\x93\xff\xf7Z\xcb\v1\xf2\xc4\x85\x85\xa6\xfa\x15\x10\xa8\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xd5\x12\xc7\x1ee\x86\xcc\xdb/\xc5\x97\xea\x93\xa7\xde\xc9u\xb1\x9f\xce\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|h$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3We\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xfb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xfc\xe1\t]\x84J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17\x85\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?2,\x89\xb1%p\x8a\r\f\xe0,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa[\xa7\x02\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\xd1`\x88\xf4K\xe7\x80\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\t\x91\xa3\"\x85H@\xb9\x97\bZ\xa5(S\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\xbc\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6\xaa`\x88\x8a\xf4u$\x17\xff\xdbR\x02\xe8V\xdc\xb8]F\xdap\xf7\xdf~G\xe1\xe8\xd2\xe6\x1d\x9b/\xd8\x93F\xcf\xae]\xbb\xa6\x85\x1d/\xef\xf8\xfb>\x9e{\\\x1e\xf1i~\xee\xbb\x1e\x93SN\nA\x99\xd8\xa1y\x185\x86\xbe\x1eU\x9b4\xeem\xaa\xae\x1b\xb09\x9f.\xa3\xc0\xe6C\xc8~\xd8\x95f\xfbF\x05\xb9\xbde\n\x82\x91\r\xf0\x16\xbe[\x00H\x96\x7f8\x7fx\x06\xe9\x0fa\xfa\x1eg)\xc1vaG=a\xf10\x04rw\x0f\xbb%\xc6f\x81\xbaEO\x80\xc3Tc\xc4\xc0\x14\t#2\xd8\xe8\xecX4H\xf0\xc3\'\xba[\xd3}\x16\xa3\xf3\n\x00\xdd\xf3\x81\xaa\x99\xcb(\xb2\x19C\xe4\xc9\x87\x9a\x8c\xbd\xa0\x9cW\a\xb6\xc2R\xabn\xf2', 0x2761, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000240)={0x0, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500"}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) syz_open_dev$vbi(0x0, 0x1, 0x2) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 07:17:16 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf79a000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 637.931851][ T8668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 637.962742][ C1] net_ratelimit: 20 callbacks suppressed [ 637.962751][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:17:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xd]}) 07:17:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xe]}) 07:17:16 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf81b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x10]}) 07:17:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x11]}) 07:17:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2001001000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 638.474161][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 638.480012][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 638.485927][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 638.491696][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:17:16 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x0) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:16 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xf8ce000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:16 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) 07:17:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x12]}) 07:17:16 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2043000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x22, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0xbf}, @connect}], 0xffffff76) 07:17:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x25]}) 07:17:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x5c]}) 07:17:17 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfc00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:17 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:17 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x20f6000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xe7]}) [ 639.077337][ T9225] FAULT_INJECTION: forcing a failure. [ 639.077337][ T9225] name failslab, interval 1, probability 0, space 0, times 0 [ 639.143781][ T9225] CPU: 0 PID: 9225 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 639.151717][ T9225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.161783][ T9225] Call Trace: [ 639.165080][ T9225] dump_stack+0x1fb/0x318 [ 639.169414][ T9225] should_fail+0x555/0x770 [ 639.173836][ T9225] __should_failslab+0x11a/0x160 [ 639.178774][ T9225] ? dst_alloc+0x173/0x580 [ 639.183184][ T9225] should_failslab+0x9/0x20 [ 639.183204][ T9225] kmem_cache_alloc+0x56/0x2e0 [ 639.183216][ T9225] dst_alloc+0x173/0x580 [ 639.183236][ T9225] ip_route_output_key_hash_rcu+0x1935/0x26b0 [ 639.192488][ T9225] ip_route_output_key_hash+0x14e/0x260 [ 639.192509][ T9225] ip_route_output_flow+0x29/0xc0 [ 639.192521][ T9225] ? security_sk_classify_flow+0x8f/0xa0 [ 639.192535][ T9225] raw_sendmsg+0x13a5/0x3790 [ 639.223588][ T9225] inet_sendmsg+0x147/0x310 [ 639.228094][ T9225] ? security_socket_sendmsg+0xa0/0xd0 [ 639.233552][ T9225] ? inet_send_prepare+0x250/0x250 [ 639.238666][ T9225] sock_write_iter+0x2a6/0x3a0 [ 639.243437][ T9225] __vfs_write+0x5a1/0x740 [ 639.247867][ T9225] vfs_write+0x275/0x590 [ 639.252120][ T9225] ksys_write+0x117/0x220 [ 639.256452][ T9225] __x64_sys_write+0x7b/0x90 [ 639.261043][ T9225] do_syscall_64+0xf7/0x1c0 [ 639.265557][ T9225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.271437][ T9225] RIP: 0033:0x45a639 [ 639.275326][ T9225] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.294921][ T9225] RSP: 002b:00007fe4c9576c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 639.294931][ T9225] RAX: ffffffffffffffda RBX: 00007fe4c9576c90 RCX: 000000000045a639 [ 639.294938][ T9225] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 639.294943][ T9225] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 639.294949][ T9225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe4c95776d4 [ 639.294954][ T9225] R13: 00000000004caf0b R14: 00000000004e33b0 R15: 0000000000000004 07:17:17 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfe80000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x300]}) 07:17:17 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2500000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:17 executing program 3 (fault-call:5 fault-nth:1): r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x500]}) [ 639.747597][ T9410] FAULT_INJECTION: forcing a failure. [ 639.747597][ T9410] name failslab, interval 1, probability 0, space 0, times 0 [ 639.804310][ T9410] CPU: 0 PID: 9410 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 639.812156][ T9410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.822208][ T9410] Call Trace: [ 639.825500][ T9410] dump_stack+0x1fb/0x318 [ 639.829835][ T9410] should_fail+0x555/0x770 [ 639.834258][ T9410] __should_failslab+0x11a/0x160 [ 639.839195][ T9410] should_failslab+0x9/0x20 [ 639.843696][ T9410] kmem_cache_alloc_node+0x65/0x280 [ 639.848879][ T9410] ? __alloc_skb+0x9f/0x500 [ 639.848892][ T9410] ? __local_bh_enable_ip+0x13a/0x240 [ 639.848906][ T9410] __alloc_skb+0x9f/0x500 [ 639.848923][ T9410] alloc_skb_with_frags+0xb6/0x600 [ 639.848943][ T9410] sock_alloc_send_pskb+0x7cc/0xbc0 [ 639.848966][ T9410] ? xfrm_lookup_route+0x60/0x190 [ 639.848978][ T9410] sock_alloc_send_skb+0x32/0x40 [ 639.848989][ T9410] raw_sendmsg+0x194b/0x3790 [ 639.849031][ T9410] inet_sendmsg+0x147/0x310 [ 639.892431][ T9410] ? security_socket_sendmsg+0xa0/0xd0 [ 639.897892][ T9410] ? inet_send_prepare+0x250/0x250 [ 639.903017][ T9410] sock_write_iter+0x2a6/0x3a0 [ 639.904126][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 639.907780][ T9410] __vfs_write+0x5a1/0x740 [ 639.907806][ T9410] vfs_write+0x275/0x590 [ 639.907822][ T9410] ksys_write+0x117/0x220 [ 639.913556][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 639.917926][ T9410] __x64_sys_write+0x7b/0x90 [ 639.917940][ T9410] do_syscall_64+0xf7/0x1c0 [ 639.917954][ T9410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.917966][ T9410] RIP: 0033:0x45a639 [ 639.922262][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 639.926482][ T9410] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.926488][ T9410] RSP: 002b:00007fe4c9576c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 639.926499][ T9410] RAX: ffffffffffffffda RBX: 00007fe4c9576c90 RCX: 000000000045a639 [ 639.926503][ T9410] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 639.926511][ T9410] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 639.932234][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 639.936769][ T9410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe4c95776d4 [ 639.936775][ T9410] R13: 00000000004caf0b R14: 00000000004e33b0 R15: 0000000000000004 [ 640.030773][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 644.064144][ C1] net_ratelimit: 15 callbacks suppressed [ 644.064151][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 644.075617][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 644.144140][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 644.149940][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 644.155775][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 644.161519][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 644.704194][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 644.709999][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 644.715862][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 644.721619][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:17:27 executing program 4: r0 = getpid() openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setpgid(0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r1 = syz_open_dev$loop(0x0, 0x0, 0x182) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) setpgid(0x0, 0xffffffffffffffff) gettid() getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000000)) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = gettid() r5 = gettid() sendmmsg$unix(r3, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="cf073be41c00000058778ffc0100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x70}], 0xfd, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r6, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) connect(r7, &(0x7f00000000c0)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80) r8 = gettid() r9 = gettid() sendmmsg$unix(r7, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r7]}}, @cred={{0x1c, 0x1, 0x2, {r8}}}, @rights={{0x14, 0x1, 0x1, [r6]}}, @cred={{0x1c, 0x1, 0x2, {r9}}}], 0x70}], 0xfd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000600), 0x4) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r10, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r10, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r10, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) setsockopt$inet_MCAST_MSFILTER(r10, 0x0, 0x30, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000000)={0xb, 0x77, 0x0, 0x8}, 0xb) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) 07:17:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r8, 0x9}, 0x8) sendmsg$nfc_llcp(r4, &(0x7f00000007c0)={&(0x7f0000000280)={0x27, 0x1, 0x2, 0x5, 0x5, 0x5, "6c2d5a5a963c95c62716609e841d03610244d0ed36bcf5be68403bfd01f409ae1a07cb2f5b0e9d0b11862f5ef7064c8d1ca508342b8ec436dedb7bcc9fa771", 0x33}, 0x60, &(0x7f00000006c0)=[{&(0x7f0000000340)="a7adeb2c746dfed25a20978ec8e0d32ff22a345d5775512878296b552af4b600ab4b39438e7bf76acd65281059404e195e198e4978a0830b19ec950366490ad90a70dd6595ebb61e6ec52158b5fd252416df49cd34d2f2d509a3d2af4cfbea01d88c08844807de9160b95170c66e36976811431d", 0x74}, {&(0x7f00000003c0)="816e62a707b35f579ed5ee5a2f1a108a5a1a813123147e7488765ca1c63dca9c6290dafc91d47be5acea368737b81aed1759ca9a8d8f525de22f68532cc199219383077e755ea19cb54dfec5e5eeedad18b32bb2944c4fa90101742de56eb7eea5f0803df13eeee319572b07d2a65bcb68bddecde1c491387d22a39657453e533a9144c81fa93c69358682e57c348e15c11dda329f01c35fe600df9758bddb445a1097dc1ea0d67acc", 0xa9}, {&(0x7f0000000480)="513baab7a0dc59be19757727f70cc2f8da167648e5e62034eaa7e6f5d999a93cfaf401dc271e0cee638feb6b29c6c86b408f387240b5f3d5c699c8512a2f71e9ffdf6a27ca927b96ac44293b7abb7b98743027e122e896cb75adf0236ceb3e666d297a4431b2dd6c60cce9514baa0da2a9b8090f2fed76801feac16ebaf058e291862e0cc4646e9168b9bf6452da7bfd6b41e351dd71def5246adcd12ef465bddc1a67df2f3c4686c3adb7bda3c00d3894bffa7c15d5e3bd031cd28318c2737d8beec7c5f89cb674626861da97c0a409bbd7ce614a29aefc28469199e89dc5408bdd61a72d8fd0bfb9b815d73695126f51a98ee9abfeb2a0", 0xf8}, {&(0x7f0000000580)="62e4040341999c8dc97b160656445fdcd47cc02ffd125907d913ae7a64d09fa5d51efd594f147f1faa7374ab5612c522b394810ad150383775aed1b99262ff386012d6b2f5e0ad8d0bcc604c819da76cf7435463ce41753193a0f3fed0c0a0fb2ae6", 0x62}, {&(0x7f0000000600)="27ef2892af8811a625b5fb0982857a87df0ead855e1d48e0d2aad7c25bbc887237956f277ef40ecf351d0fe684993a26166378031567361ddd63a3c13cdee20045722075b197c34fbc93a1743a3f3883af2bc3e84e91e44e3a22055593921b3d52a54a5497960707d281915bf975643aba568b2a55d3984749dd4d0dc4ce47dbc1d6c5e5bb14c33c8c7aa373c851f1f20124fff52b350d451d5a55cb24355af75e3e57a79cd6b046eda96064635931e9af518b32b9fc54f7953342f52ca7c8", 0xbf}], 0x5, &(0x7f0000000740)={0x60, 0x398, 0x8, "2f583a16668706df4df99288045993265f1f60f26d0ab2bcf2e81b643c6b227422381d924db50aeb2cd170f9b2174637c8f237a8bdcfd59d380e78cfbcfc4e0caad5a22cc1747be0ebd4a36a0cab70"}, 0x60, 0x10672523e1e926ec}, 0x9800) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r4, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x47659f6ce7245499}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x40, r9, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x627457a330a015f0}, 0x40) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r11, 0x40000) setsockopt$inet_mtu(r10, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x351ee40640c1b668}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000100)={r12, 0x0, r3}) connect$inet(r10, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r10, r11, 0x0, 0xffe4) 07:17:27 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x27a6000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x600]}) 07:17:27 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfe80ffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:27 executing program 3 (fault-call:5 fault-nth:2): r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 649.009721][ T9568] FAULT_INJECTION: forcing a failure. [ 649.009721][ T9568] name failslab, interval 1, probability 0, space 0, times 0 [ 649.068085][ T9568] CPU: 0 PID: 9568 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 649.075948][ T9568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.085998][ T9568] Call Trace: [ 649.089298][ T9568] dump_stack+0x1fb/0x318 [ 649.093615][ T9568] should_fail+0x555/0x770 [ 649.098055][ T9568] __should_failslab+0x11a/0x160 [ 649.102974][ T9568] should_failslab+0x9/0x20 [ 649.107454][ T9568] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 649.113151][ T9568] ? __kmalloc_node_track_caller+0x3c/0x60 [ 649.118955][ T9568] __kmalloc_node_track_caller+0x3c/0x60 [ 649.124580][ T9568] ? alloc_skb_with_frags+0xb6/0x600 [ 649.129842][ T9568] __alloc_skb+0xe8/0x500 [ 649.134168][ T9568] alloc_skb_with_frags+0xb6/0x600 [ 649.139267][ T9568] sock_alloc_send_pskb+0x7cc/0xbc0 [ 649.144450][ T9568] ? xfrm_lookup_route+0x60/0x190 [ 649.149458][ T9568] sock_alloc_send_skb+0x32/0x40 [ 649.154380][ T9568] raw_sendmsg+0x194b/0x3790 [ 649.158995][ T9568] inet_sendmsg+0x147/0x310 [ 649.163481][ T9568] ? security_socket_sendmsg+0xa0/0xd0 [ 649.168921][ T9568] ? inet_send_prepare+0x250/0x250 [ 649.174025][ T9568] sock_write_iter+0x2a6/0x3a0 [ 649.178779][ T9568] __vfs_write+0x5a1/0x740 [ 649.183183][ T9568] vfs_write+0x275/0x590 [ 649.187408][ T9568] ksys_write+0x117/0x220 [ 649.191718][ T9568] __x64_sys_write+0x7b/0x90 [ 649.196287][ T9568] do_syscall_64+0xf7/0x1c0 [ 649.200770][ T9568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.206642][ T9568] RIP: 0033:0x45a639 [ 649.210511][ T9568] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.230090][ T9568] RSP: 002b:00007fe4c9576c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 649.238476][ T9568] RAX: ffffffffffffffda RBX: 00007fe4c9576c90 RCX: 000000000045a639 [ 649.246425][ T9568] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 649.254375][ T9568] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:17:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x700]}) [ 649.262324][ T9568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe4c95776d4 [ 649.270273][ T9568] R13: 00000000004caf0b R14: 00000000004e33b0 R15: 0000000000000004 07:17:27 executing program 3 (fault-call:5 fault-nth:3): r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:27 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfec0ffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 649.330931][ C1] net_ratelimit: 20 callbacks suppressed [ 649.330939][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 649.422028][ T9685] FAULT_INJECTION: forcing a failure. [ 649.422028][ T9685] name failslab, interval 1, probability 0, space 0, times 0 [ 649.444882][ T9685] CPU: 0 PID: 9685 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 649.452722][ T9685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.462777][ T9685] Call Trace: [ 649.466072][ T9685] dump_stack+0x1fb/0x318 [ 649.470410][ T9685] should_fail+0x555/0x770 [ 649.474838][ T9685] __should_failslab+0x11a/0x160 [ 649.479783][ T9685] ? __nf_conntrack_alloc+0xbf/0x3d0 [ 649.485074][ T9685] should_failslab+0x9/0x20 [ 649.489582][ T9685] kmem_cache_alloc+0x56/0x2e0 [ 649.494351][ T9685] __nf_conntrack_alloc+0xbf/0x3d0 [ 649.499467][ T9685] init_conntrack+0x3ae/0x1420 [ 649.504236][ T9685] nf_conntrack_in+0x62e/0x11ad [ 649.509108][ T9685] ipv4_conntrack_local+0x123/0x1d0 [ 649.514307][ T9685] ? ipv4_conntrack_in+0x30/0x30 [ 649.519245][ T9685] nf_hook_slow+0xc8/0x210 [ 649.523660][ T9685] nf_hook+0x24d/0x320 [ 649.527721][ T9685] ? rcu_lock_release+0x30/0x30 [ 649.532552][ T9685] raw_sendmsg+0x24f4/0x3790 [ 649.537147][ T9685] inet_sendmsg+0x147/0x310 [ 649.541634][ T9685] ? security_socket_sendmsg+0xa0/0xd0 [ 649.547073][ T9685] ? inet_send_prepare+0x250/0x250 [ 649.552161][ T9685] sock_write_iter+0x2a6/0x3a0 [ 649.556907][ T9685] __vfs_write+0x5a1/0x740 [ 649.561308][ T9685] vfs_write+0x275/0x590 [ 649.565541][ T9685] ksys_write+0x117/0x220 [ 649.569868][ T9685] __x64_sys_write+0x7b/0x90 [ 649.574445][ T9685] do_syscall_64+0xf7/0x1c0 [ 649.578929][ T9685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.584805][ T9685] RIP: 0033:0x45a639 [ 649.588687][ T9685] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.608275][ T9685] RSP: 002b:00007fe4c9576c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 07:17:27 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2827000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x900]}) [ 649.616664][ T9685] RAX: ffffffffffffffda RBX: 00007fe4c9576c90 RCX: 000000000045a639 [ 649.624617][ T9685] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 649.632565][ T9685] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.640517][ T9685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe4c95776d4 [ 649.648465][ T9685] R13: 00000000004caf0b R14: 00000000004e33b0 R15: 0000000000000004 07:17:27 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xfeffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xa00]}) 07:17:28 executing program 4: r0 = getpid() openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) setpgid(0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) r1 = syz_open_dev$loop(0x0, 0x0, 0x182) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r1) setpgid(0x0, 0xffffffffffffffff) gettid() getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000000)) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = gettid() r5 = gettid() sendmmsg$unix(r3, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="cf073be41c00000058778ffc0100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x70}], 0xfd, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r6, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) connect(r7, &(0x7f00000000c0)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80) r8 = gettid() r9 = gettid() sendmmsg$unix(r7, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r7]}}, @cred={{0x1c, 0x1, 0x2, {r8}}}, @rights={{0x14, 0x1, 0x1, [r6]}}, @cred={{0x1c, 0x1, 0x2, {r9}}}], 0x70}], 0xfd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000600), 0x4) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r10, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r10, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r10, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) setsockopt$inet_MCAST_MSFILTER(r10, 0x0, 0x30, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000000)={0xb, 0x77, 0x0, 0x8}, 0xb) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) 07:17:28 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x28da000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000340)=""/242, &(0x7f00000000c0)=0xf2) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = accept4$bt_l2cap(0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000000100), 0x400) bind$bt_l2cap(r4, &(0x7f0000000280)={0x1f, 0x8001, {0x1, 0x20, 0x7, 0x7, 0x4, 0x8}, 0x6b, 0x2}, 0xe) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r6, r7, 0x0) getsockopt$inet_opts(r6, 0x0, 0x645702ab2a0c6300, &(0x7f00000002c0)=""/49, &(0x7f0000000440)=0x31) r8 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = dup3(r10, r11, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r12, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r12, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r9, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r13, 0x9}, 0x8) ioctl$KVM_GET_PIT(r9, 0xc048ae65, &(0x7f0000000480)) ftruncate(r8, 0x40000) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r5, r8, 0x0, 0xffe4) 07:17:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xb00]}) 07:17:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xc00]}) 07:17:28 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xff00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 650.162254][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:17:28 executing program 3 (fault-call:5 fault-nth:4): r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xd00]}) 07:17:28 executing program 4: prctl$PR_GET_FP_MODE(0x2e) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, &(0x7f00000000c0)={0x2, 0x1, [0x7fffffff, 0x3, 0x1, 0x3, 0x7891, 0x1, 0x694b, 0x5]}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 07:17:28 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2b00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:28 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xff7e000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xe00]}) [ 650.304146][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 650.309990][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 650.371429][ T9955] FAULT_INJECTION: forcing a failure. [ 650.371429][ T9955] name failslab, interval 1, probability 0, space 0, times 0 [ 650.384261][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 650.384310][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 650.384398][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 650.384439][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:17:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x1100]}) 07:17:28 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffffffff00000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 650.457542][ T9955] CPU: 1 PID: 9955 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 650.465393][ T9955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.475449][ T9955] Call Trace: [ 650.478744][ T9955] dump_stack+0x1fb/0x318 [ 650.486027][ T9955] should_fail+0x555/0x770 [ 650.490448][ T9955] __should_failslab+0x11a/0x160 [ 650.495377][ T9955] ? nf_ct_ext_add+0x35a/0x530 [ 650.500241][ T9955] should_failslab+0x9/0x20 [ 650.504724][ T9955] __kmalloc_track_caller+0x79/0x340 [ 650.510001][ T9955] __krealloc+0x89/0xb0 [ 650.514147][ T9955] nf_ct_ext_add+0x35a/0x530 [ 650.518719][ T9955] init_conntrack+0x6ce/0x1420 [ 650.523463][ T9955] nf_conntrack_in+0x62e/0x11ad [ 650.528303][ T9955] ipv4_conntrack_local+0x123/0x1d0 [ 650.533474][ T9955] ? ipv4_conntrack_in+0x30/0x30 [ 650.538386][ T9955] nf_hook_slow+0xc8/0x210 [ 650.542778][ T9955] nf_hook+0x24d/0x320 [ 650.546823][ T9955] ? rcu_lock_release+0x30/0x30 [ 650.551652][ T9955] raw_sendmsg+0x24f4/0x3790 [ 650.556323][ T9955] inet_sendmsg+0x147/0x310 [ 650.560802][ T9955] ? security_socket_sendmsg+0xa0/0xd0 [ 650.566235][ T9955] ? inet_send_prepare+0x250/0x250 [ 650.571323][ T9955] sock_write_iter+0x2a6/0x3a0 [ 650.576069][ T9955] __vfs_write+0x5a1/0x740 [ 650.580469][ T9955] vfs_write+0x275/0x590 [ 650.584690][ T9955] ksys_write+0x117/0x220 [ 650.589012][ T9955] __x64_sys_write+0x7b/0x90 [ 650.593594][ T9955] do_syscall_64+0xf7/0x1c0 [ 650.598072][ T9955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.603937][ T9955] RIP: 0033:0x45a639 [ 650.607809][ T9955] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 650.627392][ T9955] RSP: 002b:00007fe4c9576c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 650.635886][ T9955] RAX: ffffffffffffffda RBX: 00007fe4c9576c90 RCX: 000000000045a639 [ 650.643838][ T9955] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 650.653091][ T9955] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 650.661045][ T9955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe4c95776d4 [ 650.669100][ T9955] R13: 00000000004caf0b R14: 00000000004e33b0 R15: 0000000000000004 [ 650.851592][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:17:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x8001, 0x400) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r6, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) connect(r7, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() r8 = gettid() sendmmsg$unix(r7, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)}], 0x1, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x1, {{0x4, 0x400, 0x1, r8}}}, 0x28) r9 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x1000, 0x20900) bind$bt_rfcomm(r9, &(0x7f00000002c0)={0x1f, {0xfa, 0x7f, 0x5, 0x6, 0x80, 0x40}, 0x80}, 0xa) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:29 executing program 3 (fault-call:5 fault-nth:5): r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x1200]}) 07:17:29 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2c00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'vet\x00\x00\x00_b\x1f\x1cC\xa5e\x00', 0x0}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r6 = socket(0x200000100000011, 0x803, 0x0) bind$packet(r6, &(0x7f0000000200)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) bind$xdp(r5, &(0x7f0000000900)={0x2c, 0x0, r7}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000340)={'vxcan1\x00', r7}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="be3b9c862a7b9466ef26185913a80fafb9319386799a4957dfcb1c22450cd77fa106a01feb"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r8, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffac, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r9, 0x0, 0xe, 0x0, &(0x7f0000000040)="1c04ff01da6da9725f90c5a005dd", 0x0, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:17:29 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x2, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 650.944171][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:17:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x2500]}) 07:17:29 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x3, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000001086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x4000]}) 07:17:29 executing program 4: 07:17:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x7}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x2f8a000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:30 executing program 4: syz_open_dev$mouse(0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x4) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r0, 0x0, r0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x28000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) munlockall() prctl$PR_SET_PTRACER(0x59616d61, 0x0) gettid() socket(0x15, 0x80005, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x4, 0x40000000, 0x0, 0x0, {0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = fcntl$dupfd(r4, 0x0, r4) bind$bt_rfcomm(r5, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x2}}, 0xa) r6 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x2, 0x80) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) socket$inet6(0xa, 0x2, 0x0) 07:17:30 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x4, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000006086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x5c00]}) 07:17:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xe7ff]}) 07:17:30 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x5, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000011086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xfdfd]}) 07:17:30 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x6, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x300b000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:30 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x7, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000021086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:30 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xffe7]}) 07:17:30 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x30be000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000190000009f0000ecb0b566fe83b4a54b"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) read$usbfs(r1, &(0x7f0000000140)=""/154, 0x9a) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000100)) socket$inet_tcp(0x2, 0x1, 0x0) 07:17:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000100)={0x1, 0x7f}, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) getsockopt$kcm_KCM_RECV_DISABLE(r9, 0x119, 0x1, &(0x7f0000000340), 0x4) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="010200009e947961d942eaf23f5d52cb0288168bb359fa89d1c19dff499f50d641a394cd4bce389f611151a23f8d15cf2a973d52d3e503f4ae83bb8d2a2301c01101d637633a9dc232467495194a200125ee97dbd22fe24f553a299e8816897a9ae049bb096c98", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040)={r11}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f00000000c0)={r11, 0x101}, 0x8) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r12 = socket$inet_udp(0x2, 0x2, 0x0) r13 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r13, 0x40000) setsockopt$inet_mtu(r12, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r12, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r12, r13, 0x0, 0xffe4) 07:17:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x1000000]}) 07:17:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000002f086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:31 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x8, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r4, 0x40000) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(0xffffffffffffffff, r4, 0x0, 0xffe4) 07:17:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x2000000]}) 07:17:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='$B6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c1fd83d00"/43], 0x2b) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 07:17:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3300000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000032086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:31 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x9, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 653.072867][T11068] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.4 proc:/self/fd/4' not defined. 07:17:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x3000000]}) 07:17:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294602000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:31 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x25, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:31 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0x33, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) dup3(r1, r0, 0x0) 07:17:31 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x376e000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000), 0x0, 0x12) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294603000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x4000000]}) 07:17:32 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:32 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x38a2000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:32 executing program 4: ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000a2dbd7000ffdbdf250200000051a9626b33aae4d70100000000000c00080001000080000000000c0005000001000000000008000100000000000c7640b35f22b6c1f31aa6a70c000800020000080000000000"], 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x80000c1) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r5, 0x9}, 0x8) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000340)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) unshare(0x40000000) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) 07:17:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294604000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x5000000]}) 07:17:32 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3b00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294607000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x6000000]}) 07:17:32 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x2, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 654.232137][T11529] IPVS: ftp: loaded support on port[0] = 21 [ 654.464156][ C1] net_ratelimit: 16 callbacks suppressed [ 654.464161][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 654.475755][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 654.544129][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 654.549974][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 654.555796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 654.561547][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:17:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460a000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x7000000]}) 07:17:32 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x3, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:32 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3c00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:33 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000180)={'ip6_vti0:*\x04\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x2f05) r1 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r1, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r2 = fcntl$getown(r1, 0x9) tgkill(r2, 0xffffffffffffffff, 0x2a) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40080, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000040)={0x7, 0x4, 0x1, 0x0, 0x5, 0x3, 0x3, 0xa8, 0x40, 0x6, 0xa8, 0x3, 0x0, 0x1, 0x6, 0x1, 0x9, 0x0, 0x5}) readahead(r0, 0x7, 0x199) 07:17:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x9}, 0x8) connect$rose(r6, &(0x7f00000000c0)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}, 0x40) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x8000000]}) 07:17:33 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x4, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460f000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x9000000]}) [ 655.028622][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:17:33 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x5, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294611000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:33 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3d00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4, 0x25, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x23) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) [ 655.104242][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 655.110049][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 655.115889][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:17:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xa000000]}) 07:17:33 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x6, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294660000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x2000000000000145, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x9}, 0x8) ioctl$NBD_CLEAR_QUE(r6, 0xab05) sendfile(r4, r5, 0x0, 0xffe4) 07:17:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f00000000c0)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea876943afd874e2f98b579a708146d0e0206e73ba8c63ca04ed133b7d2d7", 0x38, 0x403}], 0xc010, &(0x7f00000001c0)={[{@data_err_ignore='data_err=ignore'}, {@oldalloc='oldalloc'}]}) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x6000, 0x0) recvfrom$x25(r0, &(0x7f0000000200)=""/47, 0x2f, 0x40010142, &(0x7f0000000240)={0x9, @null=' \x00'}, 0x12) 07:17:33 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x7, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xb000000]}) 07:17:33 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3f00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f452946fe000033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xc000000]}) 07:17:34 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x8, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600030033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:34 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x9, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xd000000]}) 07:17:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, 0x8) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000040)={0x0, 0x9, 0x6}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0xf677a11e) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 07:17:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) r6 = semget$private(0x0, 0x2, 0x100) semctl$GETPID(r6, 0x4, 0xb, &(0x7f00000000c0)=""/25) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:34 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x3f52000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600070033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xe000000]}) 07:17:34 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xa, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:34 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0d0a18db43915e3a702a9d8aea872943afd874e2f98b579a7186270146d0e02c06cffa8c67cd7dcc6760253ef0b2a20a602210318f8104a27ea57b012d31c34951dc119dac04eab9c68842086234a45", 0x5d, 0x400}], 0x1, 0x0) 07:17:34 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xb, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x10000000]}) 07:17:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f452946000a0033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 656.712817][T12591] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 656.724209][T12591] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 07:17:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x10) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x10, 0x0, 0x0) ioctl$sock_ifreq(r1, 0x89f0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, &(0x7f00000000c0)=0x2) r3 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) syz_genetlink_get_family_id$SEG6(&(0x7f0000000400)='SEG6\x00') r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000810) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0xfffffffffffffe69, &(0x7f0000000180)={0x0, 0x399}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa2) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000140005070000e7ffffff", @ANYBLOB="00000012000c00010076657468000000e1801fed9e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x8, 0x10000003}}]}, 0x34}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xfffffffffffffe69, &(0x7f0000000180)={0x0, 0x399}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_CACHEINFO={0x14, 0x6, {0x8, 0x10000003}}]}, 0x34}}, 0x0) 07:17:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x11000000]}) 07:17:35 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xc, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x2) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCADDDLCI(r6, 0x8980, &(0x7f00000000c0)={'bcsh0\x00', 0x1}) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f452946000f0033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:35 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x12000000]}) 07:17:35 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xd, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:35 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xe, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600110033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x25000000]}) 07:17:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600400033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:36 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xf, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:36 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4086000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x40000000]}) 07:17:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000640)=[{&(0x7f0000000340)="efa6c8ee7a3dc67e77e6fb36ef7a10c728fe4eb07197df33fc5c862affc861c583f0a0aead8f1e587f03f5f6e870fd9623c82d0ac7bd648a3f32045094e6437a9a8a71e6be0ed3d1c97bcb22a7ce025cc3d79357747ff2d77523df7dc082e611c1aee40a476247859b3327ec77f290363e6713cff62d3f1d7c38f0bf354f1677bf85b549face8446e6503e559d28215ab2547601d0ab7c0658414d779198f1096f97e07597b798bb8f7921a02bd4c06894a88107493da14c913af121ef4028478731971a704b", 0xc6}, {&(0x7f0000000440)="3aeea05af75f0d6a4a3e1fa65a63fcc6148ba335484d64db7ab34ca55595752ffdb3a394317a8b170eeafb923abd3ae061dc8f08ecd68035deda233a49d7a320a4e249cccc109b1ab7fbf0924764701afbede7f5bd7d0723723aaac67308954864aabb4647a05c910669d6c64030d12b0d3c3cae7b8a3c4ac04b35f695db3faf4e05fa463a54d4edaa2cc46e69efafd22479330643e02988777a37a282ad7dd1073efa30d41e4028da6b71390e97356c54c7499ed1be3b4ac9a0f78f66b6e2ba747245626ab9678b94cbe6fb35485aef1f1d41a341dfe8c2eb3e", 0xda}, {&(0x7f00000000c0)="f6d463a1b0d39b499edc20207373ff1e40b4401904e782aab661066800c0547d0756181ec4ab66bba9b9b3fed98c8f4aa83a874b342684ec151eb57196bc0bce35f1b517f54b821853c54597bf83b0da5e333fd738bbf675e1ba958558", 0x5d}, {&(0x7f0000000280)="e3deeaabca5478225ed00fd729fa7d391424c482747ace5ad0a30f3103aee8240e1d1c7d38215a2c3ca0217d984a77ec9b43727fdfec00", 0x37}, {&(0x7f0000000540)="95ac4c00ea80add9469f56e49c63168b642bd6d6bb3b03314760020bd6ed01437ab699a70134e86696cd5b69ad170a0827d627ebce81b5aad957323dc39199a231c988190058661639624bb0ba9b68e10478d368b5f3f1f615bfc4072ca5e553f1fd7b89f4cf0712d6bb42c510a69da3bf5643b3153f356cf8431f7056815b5f8b042bbad546a3dbe867067cda13e0f4c81938f7ee949a848e08defafb7d33683f6847d35a13918f8ac6a1d14fa647c8732b72666788d48d33038e86e37421c25d250d573b4896eead61786490b6de7562168ca1fd63837518dbccb995a06ae602a7f2", 0xe3}], 0x5, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) 07:17:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x5c000000]}) 07:17:36 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x10, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600600033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:36 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4736000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xe7ffffff]}) 07:17:36 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x11, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600fe0033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:37 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x47e9000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xfdfdffff]}) 07:17:37 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x12, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000003a086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r4, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r4, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000000c0)={'hwsim0\x00', 0x1}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r6, 0x40000) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r5, r6, 0x0, 0xffe4) 07:17:37 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xfffffdfd]}) 07:17:37 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x25, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000006c086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xffffffe7]}) 07:17:37 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f452946ffffff84086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:37 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x2b, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 659.789294][ C0] net_ratelimit: 26 callbacks suppressed [ 659.789302][ C0] IPv4: Oversized IP packet from 127.0.0.1 07:17:38 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x486a000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0xffffffff]}) 07:17:38 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x2c, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f452946ffffff88086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001e00)=[{{&(0x7f0000000280)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/210, 0xd2}, {&(0x7f0000001440)=""/242, 0x460}, {&(0x7f0000000100)=""/11, 0xb}, {&(0x7f0000001540)=""/61, 0x3d}], 0x5, &(0x7f0000001600)=""/68, 0x44}, 0x9}, {{&(0x7f0000001680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001700)=""/148, 0x94}, {&(0x7f00000017c0)}, {&(0x7f0000001800)=""/102, 0x66}, {&(0x7f0000001880)=""/247, 0xf7}, {&(0x7f0000001980)=""/226, 0xe2}, {&(0x7f0000001a80)=""/174, 0xae}], 0x6}, 0x10001}, {{&(0x7f0000001bc0)=@can, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001c40)=""/246, 0xf6}], 0x1, &(0x7f0000001d80)=""/94, 0x5e}, 0xe8}], 0x3, 0x0, &(0x7f0000001ec0)={0x77359400}) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000001f40)={'nat\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000001f00)=[{}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r6, 0x40000) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r5, r6, 0x0, 0xffe4) 07:17:38 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x33, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500"}) 07:17:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600020033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:38 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4c00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x2]}) 07:17:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600030033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x3]}) [ 660.564326][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:17:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600040033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:38 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x3b, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:38 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4f1a000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 660.704139][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 660.709987][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:17:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x4]}) [ 660.784142][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 660.789989][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 660.795858][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 660.801601][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 661.253051][ C0] IPv4: Oversized IP packet from 127.0.0.1 07:17:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x4fcd000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) getpid() r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xfffff30, 0x0) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000280)=0x44) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r10, 0x9}, 0x8) accept4$inet6(r6, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0xc0800) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000002c0)={0x10000, 0xfff, 0x4, 0x7f, 0x7ff, 0x6}) 07:17:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600070033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:39 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x3c, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x5]}) [ 661.344185][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:17:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f452946000a0033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x6]}) 07:17:39 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x3d, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:39 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x504e000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f452946000f0033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:39 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x48, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x7]}) 07:17:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600110033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600600033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:40 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x57b1000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:40 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x4c, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x8]}) 07:17:40 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x60, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x9]}) 07:17:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600fe0033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:40 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = gettid() r3 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}], 0x70}], 0xfd, 0x0) r4 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r4, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r5 = fcntl$getown(r4, 0x9) prlimit64(r5, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0xffffffc6) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet(0x2, 0x3, 0x4) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r11, 0x40000) setsockopt$inet_mtu(r10, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) socket$nl_generic(0x10, 0x3, 0x10) connect$inet(r10, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r10, r11, 0x0, 0xffe4) 07:17:40 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5832000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:40 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x64, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xa]}) 07:17:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000333086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xb]}) 07:17:40 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x68, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:40 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x58e5000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000733086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xc]}) 07:17:41 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x6c, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000a33086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x10f, 0xe4fa}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0x243) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x24, r1, 0x100, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xffffff37}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000021}, 0xf9372499c5b127c6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r7, 0x40000) setsockopt$inet_mtu(r6, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r6, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r6, r7, 0x0, 0xffe4) 07:17:41 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x74, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xd]}) 07:17:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000f33086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:41 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x5f95000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600001133086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xe]}) 07:17:41 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x78, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x10]}) 07:17:41 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6000000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600004033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:41 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x7a, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x4040, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) ftruncate(r6, 0x40000) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r5, r6, 0x0, 0xffe4) 07:17:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x11]}) 07:17:42 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xb3, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600006033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6016000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair(0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r5, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r6, 0x9}, 0x8) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r9, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$DRM_IOCTL_AGP_ALLOC(r9, 0xc0206434, &(0x7f0000000080)={0x794c, 0x0, 0x2, 0x80}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000180)={0x3, r10, 0x0, 0x400}) write$P9_RVERSION(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x15) r11 = dup(r1) write$FUSE_BMAP(r11, &(0x7f0000000100)={0x18}, 0x18) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x11d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_RETRIEVE(r11, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lremovexattr(0x0, 0x0) 07:17:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x12]}) 07:17:42 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xfc, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000fe33086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x25]}) 07:17:42 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x60c9000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:42 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = gettid() r3 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}], 0x70}], 0xfd, 0x0) r4 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r4, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r5 = fcntl$getown(r4, 0x9) prlimit64(r5, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0xffffffc6) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet(0x2, 0x3, 0x4) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r11, 0x40000) setsockopt$inet_mtu(r10, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) socket$nl_generic(0x10, 0x3, 0x10) connect$inet(r10, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r10, r11, 0x0, 0xffe4) [ 664.874123][ C1] net_ratelimit: 17 callbacks suppressed [ 664.874128][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 664.885555][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 664.954488][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 664.960299][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 664.966107][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 664.971839][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:17:43 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') prlimit64(0x0, 0xe, &(0x7f0000000300)={0x9, 0xe4fa}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x12, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000540)="7b3f430cd7b155a852386c74bfbf719ccccabd25ecf854c24db75a67f75aa789502a0883b5891e50a329f733be567180121e16bb894daa77be471adc1f17d96b6192e9ff5fc131a2ff2b558f6afa867d82c643d6a8a8bf545557677b00c2d095f370274262646c62a51a47810008000000000000ca7126711e4f445c9dcae5895dfbf34e371d81d6f0c726c7071d0914473f443531edef565ba906be90af76e4bc10535a3d48a585b68dd105c4e1328107e2f4f4d94d3691591e3e0b9ffa21eb39c7cdf5bb4809d26524d9948c5ec66c86ac12975f6d6aba32b4cb69", 0xdc) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) ftruncate(r5, 0x40000) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r4, r5, 0x0, 0xffe4) r6 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x6, 0x2000) getsockopt$CAN_RAW_LOOPBACK(r6, 0x65, 0x3, &(0x7f0000000100), &(0x7f0000000280)=0x4) 07:17:43 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x103, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000006086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x5c]}) 07:17:43 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6400000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:43 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x25000000]}) 07:17:43 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) write(r2, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x6b, 0x0, 0x8) r7 = socket$unix(0x1, 0x5, 0x0) bind$unix(r7, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r7, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) connect(r8, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r9 = gettid() r10 = gettid() sendmmsg$unix(r8, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r8]}}, @cred={{0x1c, 0x1, 0x2, {r9}}}, @rights={{0x14, 0x1, 0x1, [r7]}}, @cred={{0x1c, 0x1, 0x2, {r10}}}], 0x70}], 0xfd, 0x0) r11 = getpgid(r10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) r13 = socket$inet(0x2, 0x4000000805, 0x0) r14 = socket$inet_sctp(0x2, 0x5, 0x84) r15 = dup3(r13, r14, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r15, 0x84, 0x6b, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r15, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9, 0x0}, &(0x7f0000000140)=0x20) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r12, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r16, 0x9}, 0x8) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x5, 0x4, 0x52, 0x1f, 0x0, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40, 0xbe822cc7df5e0138, @perf_config_ext={0x3, 0xb7c9}, 0x2000, 0x1f, 0x5, 0x4, 0x504e, 0x1, 0xfff}, r11, 0xc, r12, 0x19) fstat(0xffffffffffffffff, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000100)={0x200, 0x0, 0x8200, 0x6, 0x2, 0x7, 0x6, 0x9}, &(0x7f0000000140)=0x20) ioctl$LOOP_SET_BLOCK_SIZE(r6, 0x4c09, 0x8001) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:17:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000011086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xe7]}) [ 665.249278][ C1] IPv4: Oversized IP packet from 127.0.0.1 07:17:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000021086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:43 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x1f4, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x300]}) [ 665.504231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 665.510095][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 665.515977][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:17:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) getpid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x7c72b077e3fd11f7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = getpid() fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = socket(0x10, 0x3, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000000c0)='$GPL\x00'}, 0x30) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) fcntl$getown(0xffffffffffffffff, 0x9) r3 = socket(0x10, 0x3, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r5, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r6 = getpid() sched_setscheduler(r6, 0x0, &(0x7f0000000380)) perf_event_open(0x0, r6, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, 0x0) preadv(r7, &(0x7f00000017c0), 0x3a8, 0x0) r8 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyri.g\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000180)={r9, 0x92, 0x64}, 0x0, &(0x7f0000000480)="21fd0d6295f6cec4729fcf687e7a4f87e86b49c22b797a8ec10960daa0aa9a1e0eb4fb6b9fd427a75bf3cfba5cda768eb1641d08c901305ebd627b7f21cdde855dea40cafcb948593f97a6d7e58c74dc7747ebec672a1e910a5f1939b1c82dc76ac959a5409e0d8902c4fbff175e269c969a6e6011c496803278ea961ad202b52b161af55c7931b94bc3c316932def048240", &(0x7f0000000240)=""/100) 07:17:44 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6779000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000002f086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:44 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x300, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x500]}) 07:17:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x600]}) 07:17:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000032086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:44 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x301, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x700]}) 07:17:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000233086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:44 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:44 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x3e8, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x900]}) 07:17:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000333086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:44 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = gettid() r3 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}], 0x70}], 0xfd, 0x0) r4 = getpgid(r3) r5 = getpgid(r4) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x20}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) pipe(0x0) close(0xffffffffffffffff) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @local, 0x2}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, 0x0, 0x0) dup2(r7, 0xffffffffffffffff) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r11, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x4e22, 0x0, @local, 0x8000}, r12}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000580)={0x3, 0x3ca, 0xfa00, {{0xa, 0x4e22, 0x0, @mcast2}, {0xa, 0x0, 0x0, @local}}}, 0x48) dup2(r9, r10) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, 0x0, 0x0) pipe(0x0) close(0xffffffffffffffff) r14 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r14, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b"}, {0xa, 0x0, 0x0, @local}}}, 0x48) dup2(r13, 0xffffffffffffffff) r15 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r15, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000080)={0x0, 0x3f9, 0xfa00, {0xfffffffffffffffd, 0x0, 0x111, 0x9}}, 0x13) write$RDMA_USER_CM_CMD_RESOLVE_IP(r16, &(0x7f0000000580)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @rand_addr="f40a250b388d101af1158aec7455e37b", 0x36}, {0xa, 0x0, 0x0, @local}}}, 0xfffffffffffffc9e) dup2(r15, r16) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x80287010, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 07:17:44 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x3ef, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xa00]}) 07:17:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000433086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:44 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x68ad000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:44 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x4d8, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000733086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xb00]}) 07:17:45 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x500, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000a33086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xc00]}) 07:17:45 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8060075e62df1a"], 0x7) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1040, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x20, 0xfb1, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) 07:17:45 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x598, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:45 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6c00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000f33086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xd00]}) 07:17:45 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x5c8, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600001133086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:45 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x600, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xe00]}) 07:17:45 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x7fffffff, 0x9, 0x2, 0x8100000, 0x1, [{0x80000000, 0x100, 0x0, 0x0, 0x0, 0x400}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400080}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x64}, 0x1, 0x0, 0x0, 0x8000}, 0x5420) mount$bpf(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x1000020, 0x0) 07:17:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1100]}) 07:17:45 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x6f5d000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:45 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x700, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600006033086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1200]}) 07:17:45 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x763, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000fe33086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:46 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x897, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x2500]}) 07:17:46 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7091000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000003a086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 668.033966][T16091] EXT4-fs (sda1): re-mounted. Opts: (null) 07:17:46 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7400000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000006c086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:46 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x900, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x4000]}) 07:17:46 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x135) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000380)=0x1, 0x3) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x44080) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r3, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="30000000100001080001000000fd6c0000000000a8ec7237a4c3ba99771b00ca3b614f44be47892b9104cb3fd12856d7ca50a11141b52a13b1744a437f50c99ab5d7effd61dacee59f4a904e4ceccd465d80ed8cf935", @ANYRES32=0x0, @ANYBLOB="0a0000000000000008001b0000efff04000000000000000e9e09a862005d000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 07:17:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x5c00]}) 07:17:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000006086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:46 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x987, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:46 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7741000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000011086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:46 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xa00, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xe7ff]}) 07:17:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x4}]]}}}]}, 0x3c}}, 0x0) 07:17:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000021086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 668.801160][T16609] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 07:17:47 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xb00, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfdfd]}) 07:17:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000002f086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x77f4000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:47 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xb30, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xffe7]}) 07:17:47 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) unshare(0x400) socket$inet6_sctp(0xa, 0x0, 0x84) connect$can_j1939(r0, &(0x7f00000001c0)={0x2}, 0x18) 07:17:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000032086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1000000]}) 07:17:47 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xc00, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7800000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:47 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xd00, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000003a086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x2000000]}) 07:17:47 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206040200000001021040003900150035004c0a0100000019000b4023dc0b04000022dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060c3a62645656", 0x55}], 0x1}, 0x0) fsync(r0) r1 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x3, 0x210200) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r2, r3, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000280), 0xa}, 0x200008028, 0x10000000000, 0x20000}, r4, 0x5, r1, 0x29c0c59f198e9dd7) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) r6 = syz_open_dev$amidi(&(0x7f0000000400)='/dev/amidi#\x00', 0xfffffffffffffff8, 0x14180) ioctl$RTC_WIE_OFF(r6, 0x7010) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r7, r8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r7) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x21) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000180)={r5, 0x1, 0x6}, 0x10) write$P9_RRENAME(r6, &(0x7f0000000440)={0x7, 0x15, 0x1}, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x84400, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r9, 0x6, 0x23, &(0x7f0000000380)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f00000003c0)=0x10) open$dir(&(0x7f0000000080)='./file0\x00', 0x8ce67fc4148f3368, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) 07:17:47 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7875000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x3000000]}) 07:17:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f4529460000006c086c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 669.647679][T17169] netlink: 'syz-executor.4': attribute type 21 has an invalid length. 07:17:47 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xe00, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033106c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x4000000]}) 07:17:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x12}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0xe) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) shmget(0x2, 0x1000, 0x1c, &(0x7f000096d000/0x1000)=nil) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001400)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000001440)={@local, 0x51, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 07:17:48 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xf00, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x5000000]}) 07:17:48 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7a00000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f452946000000332c6c0200000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:48 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xf1f, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x6000000]}) 07:17:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0300000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) 07:17:48 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x33) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0xf47, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000240)={0x8098f90b, 0x0, "f11e6a7c369ffc3522fb27e1256defcdc8ef040383304500", 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x7000000]}) 07:17:48 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x33) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x2, "84f3"}, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x7f25000000000000, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 07:17:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="4ef27f45294600000033086c0400000000000000014410051166010000003800000000000044130a000b00000800"/56], 0x38) [ 670.364601][T17371] ------------[ cut here ]------------ [ 670.370120][T17371] generic_make_request: Trying to write to read-only block-device nullb0 (partno 0) [ 670.404418][T17371] WARNING: CPU: 0 PID: 17371 at block/blk-core.c:800 generic_make_request_checks+0x633/0x1a60 [ 670.408038][ T3906] kobject: 'loop3' (000000001a53e7c4): kobject_uevent_env [ 670.414696][T17371] Kernel panic - not syncing: panic_on_warn set ... [ 670.414709][T17371] CPU: 0 PID: 17371 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 670.414714][T17371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.414718][T17371] Call Trace: [ 670.414732][T17371] dump_stack+0x1fb/0x318 [ 670.414747][T17371] panic+0x264/0x7a9 [ 670.414756][T17371] ? __warn+0x105/0x210 [ 670.414768][T17371] ? generic_make_request_checks+0x633/0x1a60 [ 670.414779][T17371] __warn+0x20e/0x210 [ 670.414790][T17371] ? generic_make_request_checks+0x633/0x1a60 [ 670.454184][ T3906] kobject: 'loop3' (000000001a53e7c4): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 670.457806][T17371] report_bug+0x1b6/0x2f0 [ 670.492432][T17371] ? generic_make_request_checks+0x633/0x1a60 [ 670.498497][T17371] do_error_trap+0xd7/0x440 [ 670.502999][T17371] do_invalid_op+0x36/0x40 [ 670.507405][T17371] ? generic_make_request_checks+0x633/0x1a60 [ 670.513463][T17371] invalid_op+0x23/0x30 [ 670.517611][T17371] RIP: 0010:generic_make_request_checks+0x633/0x1a60 [ 670.524273][T17371] Code: 3c 05 00 00 4c 89 f8 48 c1 e8 03 8a 04 08 84 c0 0f 85 17 14 00 00 41 8b 17 48 c7 c7 73 98 40 88 4c 89 f6 31 c0 e8 0d 5d 14 fe <0f> 0b e9 35 fc ff ff e8 41 c6 41 fe c6 05 36 56 89 05 01 48 c7 c7 [ 670.537949][ T3906] kobject: 'loop0' (00000000b3ed66b8): kobject_uevent_env [ 670.543869][T17371] RSP: 0000:ffff888053b27440 EFLAGS: 00010246 [ 670.557009][T17371] RAX: a53bcc22594db600 RBX: 0000000000000001 RCX: ffff8880a77d83c0 [ 670.564971][T17371] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 670.572937][T17371] RBP: ffff888053b27500 R08: ffffffff815cc074 R09: ffffed1015d46120 [ 670.580901][T17371] R10: ffffed1015d46120 R11: 0000000000000000 R12: ffff888050a1d448 [ 670.588875][T17371] R13: 1ffff1100a143a89 R14: ffff888053b274a0 R15: ffff8880a2f5b53c [ 670.596849][T17371] ? vprintk_emit+0x2d4/0x3a0 [ 670.601544][T17371] ? rcu_lock_release+0xd/0x30 [ 670.606313][T17371] generic_make_request+0x33/0x980 [ 670.607437][ T3906] kobject: 'loop0' (00000000b3ed66b8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 670.611420][T17371] ? rcu_lock_release+0xd/0x30 [ 670.626291][T17371] submit_bio+0x26b/0x540 [ 670.630616][T17371] ? wbc_account_cgroup_owner+0x215/0x340 [ 670.636337][T17371] submit_bh_wbc+0x619/0x700 [ 670.640935][T17371] __block_write_full_page+0x943/0x1070 [ 670.646471][T17371] ? blkdev_direct_IO+0xd0/0xd0 [ 670.651315][T17371] ? mark_buffer_write_io_error+0x160/0x160 [ 670.657210][T17371] block_write_full_page+0x1a4/0x220 [ 670.662488][T17371] ? blkdev_direct_IO+0xd0/0xd0 [ 670.667342][T17371] blkdev_writepage+0x24/0x30 [ 670.672014][T17371] __writepage+0x63/0xd0 [ 670.676254][T17371] write_cache_pages+0x94a/0xe70 [ 670.676580][ T3906] kobject: 'loop2' (000000003a9f872d): kobject_uevent_env [ 670.681180][T17371] ? generic_writepages+0xd0/0xd0 [ 670.681205][T17371] ? rcu_lock_release+0xd/0x30 [ 670.681217][T17371] ? wbc_attach_and_unlock_inode+0x3a0/0x5d0 [ 670.704034][T17371] generic_writepages+0x93/0xd0 [ 670.708893][T17371] blkdev_writepages+0x1d/0x30 [ 670.713651][T17371] ? blkdev_readpage+0x20/0x20 [ 670.718409][T17371] do_writepages+0xfb/0x1f0 [ 670.722914][T17371] ? wbc_attach_and_unlock_inode+0x3f0/0x5d0 [ 670.729616][T17371] __filemap_fdatawrite_range+0x2c2/0x360 [ 670.735345][T17371] filemap_write_and_wait+0xca/0x160 [ 670.740625][T17371] __blkdev_put+0x1a2/0x6d0 [ 670.745130][T17371] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 670.749578][ T3906] kobject: 'loop2' (000000003a9f872d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 670.750756][T17371] blkdev_put+0x2c8/0x3b0 [ 670.765200][T17371] blkdev_close+0x7b/0xa0 [ 670.769522][T17371] ? blkdev_open+0x2c0/0x2c0 [ 670.774105][T17371] __fput+0x2e4/0x740 [ 670.778091][T17371] ____fput+0x15/0x20 [ 670.782063][T17371] task_work_run+0x17e/0x1b0 [ 670.786653][T17371] do_exit+0x5e8/0x2190 [ 670.791756][T17371] ? __kasan_check_read+0x11/0x20 [ 670.796779][T17371] ? ___preempt_schedule+0x16/0x20 [ 670.801896][T17371] do_group_exit+0x15c/0x2b0 [ 670.803240][ T3906] kobject: 'loop5' (00000000a98b3117): kobject_uevent_env [ 670.806489][T17371] __do_sys_exit_group+0x17/0x20 [ 670.806500][T17371] __se_sys_exit_group+0x14/0x20 [ 670.806509][T17371] __x64_sys_exit_group+0x3b/0x40 [ 670.806520][T17371] do_syscall_64+0xf7/0x1c0 [ 670.806533][T17371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.806541][T17371] RIP: 0033:0x45a639 [ 670.806550][T17371] Code: 03 00 00 48 29 f0 48 3d f8 12 00 00 76 7d 48 81 ec 08 10 00 00 48 89 ac 24 00 10 00 00 48 8d ac 24 00 10 00 00 48 8b 59 20 48 <85> db 75 67 48 8b b4 24 20 10 00 00 8b 8c 24 28 10 00 00 48 89 e7 [ 670.806559][T17371] RSP: 002b:00007fff585539f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 670.806572][T17371] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000045a639 [ 670.813716][ T3906] kobject: 'loop5' (00000000a98b3117): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 670.818601][T17371] RDX: 0000000000414111 RSI: 0000000000a770d0 RDI: 0000000000000000 [ 670.818608][T17371] RBP: 00000000004bff37 R08: 000000000000000c R09: 00007fff58553b00 [ 670.818613][T17371] R10: 00000000024cd940 R11: 0000000000000246 R12: 000000000075bfc8 [ 670.818618][T17371] R13: 0000000000000004 R14: 0000000000000001 R15: 000000000075bfd4 [ 670.820194][T17371] Kernel Offset: disabled [ 670.926413][T17371] Rebooting in 86400 seconds..