e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0xd000000) 19:32:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) 19:32:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4f6d, 0x0, 0x0, 0x0, 0x19fba743}, [@jmp={0x5, 0x8000, 0xb, 0x9, 0x8, 0xfffffffffffffff8, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4ef}, @call={0x85, 0x0, 0x0, 0xd}, @exit, @alu={0x7, 0x7, 0x6, 0xbc629e8de0e93361, 0x7, 0x8, 0x10}]}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 19:32:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x400000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x403e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x48) 19:32:54 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0xd3f3c5d) 19:32:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3ffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x41f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 19:32:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x500000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x7ffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x403f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r1, 0x752}}, 0x18) 19:32:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x48) 19:32:54 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0xd6e330c) 19:32:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0xe7, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000001b0000008400000000000000953fd02d0f000000"], &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x3, 0x0, 0x1fe}, 0x10}, 0x11) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f0000000140)='./file0/file0\x00', 0x1, 0x4, &(0x7f0000000440)=[{&(0x7f0000000180)="031a3ceac4aafc3446ba11b8b5aff39ad4a38344b1e5f66a97ad9af81e0ac8ecdf7540321ff29d7f3edbc61f1767df6c68d69970eb4873ff7c907c06332795e9e647259fa323b35ccbb189f6a4d5d94f1f0a4e6138b3d9d3866df6d8983683cade0b42a0c14e6907b924f60ef08c7b971c76a79317e71a658ae31a697067c8cf1b07fbe5a55be39ae04215052aa7a7f9677f33d8da46b263cc8194bb6a4b792ab478626138c794b04651f154ef8ad3b8d310bdb9289cfa1f755da4b14142f4a113e27dc3508413a3d80e13f1c7688cb9a925c5d825cf2d589cb809d1ca8c1a3dd881", 0xe2, 0x101}, {&(0x7f0000000280)="e83da8136910be6c66d306a5901c750df318d5160dac92afc0054787d707f8f5db759ce291bc761c09dbab81e2ee12815c07035eb0be80260aaf8f161917d32f8151361c904bd6a1e0f6512ce07d212b305aee5e7a0888e4b41e073d6d11ef7c3720ba616dc959ece54ae613674a24cf1467d07bf747e1f75f765d75c3c9dcdd1c8f38c593dd283dae0d8b39ae3810871f1f3b2141c59611767eabb6a636062c7774cc7d63a1dd1d286e85db30b0de0f503096d05c4eea38c1e4f15e380cdd01acee3e6f2a19663871e32f84a899c664fd4c1bc72e1e458a75800e1d33cc4a85471b7970", 0xe4, 0x81}, {&(0x7f0000000380)="3f0c379be22d090cedbe2518466f10b10ee6ee6841b5ec5d7af947cb4780d8364b59622c00ddafe3ee9903ebfb3856785cb19dd3962d4148e457c510d520c65dc1bb4c640613d67e5a53200d5cb5192d02ca89efb3f3c0", 0x57, 0xfffffffffffffbff}, {&(0x7f0000000400)="9b0720708dd62a7d716d8b774bf8c98f8c44dbac5309ec41a7baf2130b7fcffb6419ed57b79d64870643b18f471b59215cdd84c35b6b509a", 0x38, 0x100}], 0x8040, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 19:32:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x501000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x40400000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x48) 19:32:54 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0xdf9176d) 19:32:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1fffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x600000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x40410000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000080)) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) 19:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 19:32:55 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0xe000000) 19:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x40420000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3fffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x48) 19:32:55 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x6, 0x420001) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x22}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e21, 0x55df, @mcast1, 0x3e3}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x78) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) fcntl$lock(r0, 0x5, &(0x7f0000000140)={0x0, 0x6, 0x101, 0x20, r1}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = syz_open_dev$mice(&(0x7f0000002640)='/dev/input/mice\x00', 0x0, 0x4a0000) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x1, 0x1, 0x7fffffff, 0x81, 0x1, 0x3f, 0x100000001, {0x0, @in={{0x2, 0x4e21, @remote}}, 0xfffffffffffffffe, 0xd0, 0x9, 0x3, 0x5}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={r3, 0xd3, "39a52923165c487f5886e7d713e0af878fdf3f03aba3708f40d69fb93ec93872b5ed3b1d9cd475dd09682bac9259593123cac937efe94884227867e581ebd4d479e89539c7dc70168af20b440d45023ce000f9a442145546a260b8a3adfcb16dd4763f2cd5f6926bd848b2701a1f1f1ffcd758bf7ae9c056b40a6d66e2e936759ca7971a16de91dcdd95d2bb58ccee273084cc5a203ca142e4b765fe8600493c0ec2b8aa88a9351198f0f19cf8f707423196f8f2f29580469df64c0f05d1d0acbd9170846f7df236f4393421d780b4fb49f747"}, &(0x7f0000000280)=0xdb) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000027c0)=@sack_info={r4, 0x8, 0x1f}, &(0x7f0000002800)=0xc) 19:32:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x700000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x7fffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x40430000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x48) 19:32:55 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0xf819772) 19:32:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000001b00e522ffff00"/24], &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}, 0x48) 19:32:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x800000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:55 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0xfd30e92) 19:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x40440000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}, 0x48) 19:32:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000ff1c00000084000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r1 = dup3(r0, r0, 0x80000) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000080)) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f00000001c0)=""/70) bind$xdp(r2, &(0x7f0000000180)={0x2c, 0x7, r3, 0x12, r0}, 0x10) 19:32:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x900000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1ffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x40450000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 19:32:55 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x10000000) 19:32:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1100000890f, &(0x7f0000000200)="f90200000000004100000000") r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x1000000005}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000340)={'eql\x00', 0x1100}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x15, &(0x7f0000000180)={@mcast2}, 0x14) r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff, 0x101) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$VIDIOC_TRY_DECODER_CMD(r3, 0xc0485661, &(0x7f0000000240)={0x6, 0x1, @raw_data=[0x3, 0x8b6, 0x2, 0x209a54d7, 0x7, 0x1, 0x6, 0x5, 0x1, 0x4, 0x7d, 0x6, 0x54, 0x3, 0xffff, 0x3f]}) accept(r0, &(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, &(0x7f0000000180)=0x80) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b09f5a6dc416b43427e1dc0029bbb7000000000000000000"], &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x10}, 0x70) r4 = socket$bt_rfcomm(0x1f, 0x3, 0x3) accept4(r4, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80, 0x80000) 19:32:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3ffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x40460000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xa00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) 19:32:55 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x102524e2) 19:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x40470000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 19:32:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x7ffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xb00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60000000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000001b5401008400005e000000060a000000cc000000"], &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000080)={0x2, 0x0, [{}, {}]}) 19:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) 19:32:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xc00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60010000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x10f3177c) 19:32:56 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000140)={0x1003}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) creat(&(0x7f00000000c0)='./file0\x00', 0x8) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x800) 19:32:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1fffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xd00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60020000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) 19:32:56 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x11000000) 19:32:56 executing program 0: r0 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='-cgroupproc\x00', 0xffffffffffffffff) keyctl$clear(0x7, r0) 19:32:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3fffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xe00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60030000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 19:32:56 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0xca40, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x9, &(0x7f0000000040)=@raw=[@exit, @call={0x85, 0x0, 0x0, 0x68}, @ldst={0x3, 0x0, 0x7, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0xff, 0x7, 0x3, 0x9, 0x40, 0x1}, @alu={0x7, 0x20000000000000, 0x7, 0x0, 0x4, 0xfffffffffffffff0}, @jmp={0x5, 0x9, 0x0, 0x1, 0x2, 0x0, 0xfffffffffffffffc}, @generic={0x100000001, 0x9, 0x1, 0x9, 0x9}], &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0xffffffffffffff60, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x70) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) 19:32:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x7fffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x1000000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60040000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x115663c1) 19:32:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = socket$inet6(0xa, 0x3, 0x200) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), 0x4) 19:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc2]}, 0x48) 19:32:56 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x12000000) 19:32:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="850000001b0000008400000000beb413a552e3fd57ac00000095000000ebff00005558c894f8f351ab8cfca643ee786185a61dc766488e1925bcdb5c8610d716744fa0c3a1f10903ded2b0bf56d5a0bbcb1e8abbc3b0b5c2b8e87a81365d286b0c05a8d2836ac679eb6639dca95be7482ebb6f3fc4bc1a3bba560afd9e097ea8269bf6a2ce98"], &(0x7f0000000040)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$inet6_sctp(0xa, 0x1, 0x84) 19:32:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60050000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x1100000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x105]}, 0x48) 19:32:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) sendto$inet6(r0, &(0x7f0000000080)="b45cbaeecb60dc637e1337e224fa2f35824806f5247e5ca7515f188fbf22f2ca74493efc1205497d7b18d1e681a7328e1cf8308f8c0f3a9d4b44c052c63b1e5a198c69dc71c31aba7916c31fa1d5f1d01f9e187fbcc9bf0aa347afdaa93a05053a5bd6a332be093d632d4501e88cf2413e17ec527019341840f98ad9e54605a4c13a81465780140fa8f78e0c9369089a5c07ecd3d2e7a1ece8301adc3a977268c4307d3e8b23f0eb3bed85bd9a474956db9b0cdf3c97fb87ccd3cefd1d3cd450aa8c1f7a784973c1b2b99b65d783bd214a20", 0xd2, 0x400c4, &(0x7f0000000180)={0xa, 0x4e21, 0xffff, @loopback, 0xf9}, 0x1c) mq_unlink(&(0x7f0000000040)='ppp0-^\x00') 19:32:56 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x129326ac) 19:32:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60060000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x1200000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19c]}, 0x48) 19:32:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x8000000000000002, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x4, 0xc3) accept$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffc6d, &(0x7f00000000c0)=0x5) connect$inet6(r1, 0x0, 0x0) getpid() pread64(r1, &(0x7f0000000480)=""/4096, 0x1000, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000040)={0x77359400}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x800010b, 0x18) 19:32:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60070000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x2000000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1cf]}, 0x48) 19:32:56 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x12d45e78) 19:32:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1ffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x2500000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60080000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1d8]}, 0x48) 19:32:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x2700000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60090000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3ffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:57 executing program 0: clone(0x2502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 19:32:57 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x12f474f1) 19:32:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x22c]}, 0x48) 19:32:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x2c02000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x600a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x7ffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0]}, 0x48) 19:32:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x400000000000013, &(0x7f0000000480)=0x100000001, 0x6c64f6956a8bc116) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r1, 0x0, 0xffd0, 0x40080020003ffc, &(0x7f0000000000)=@abs={0x1}, 0x59) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) accept$inet(r0, 0x0, 0x0) 19:32:57 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1310a3b4) 19:32:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x600b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x600c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x135dc3c2) 19:32:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2f4]}, 0x48) 19:32:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x4000000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x10000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:57 executing program 0: r0 = open(&(0x7f00000009c0)='./file0\x00', 0x40440, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x80400100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2002001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x2e3) recvfrom$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 19:32:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x600d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x4800000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 19:32:57 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x13afbb91) 19:32:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1fffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x600e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x4c00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3fffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x37d]}, 0x48) 19:32:57 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x13c0936a) 19:32:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x600f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@resize_auto='resize=auto'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:32:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x7fffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x6800000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc]}, 0x48) 19:32:58 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x146f46d1) 19:32:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x6c00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60100000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2800.977984][ T7344] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "" 19:32:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x100000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60110000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f4]}, 0x48) 19:32:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x7400000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2801.164909][ T7344] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "" 19:32:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) 19:32:58 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1484bf8d) 19:32:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60120000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x7401000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1ffffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc]}, 0x48) 19:32:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x7a00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60130000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x14903d35) 19:32:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 19:32:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x200000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x7d03000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000000)=0x100000, 0x100000008001) 19:32:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x300000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60140000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x501]}, 0x48) 19:32:58 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x14b9d7e9) 19:32:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x8000000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3ffffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60150000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 19:32:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x9c01000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:58 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x14ba1ca3) 19:32:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x400000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:59 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x4]) syz_open_dev$mice(0x0, 0x0, 0x0) 19:32:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 19:32:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60160000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xa002000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x154df545) 19:32:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) 19:32:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x500000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xc200000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x4]) syz_open_dev$mice(0x0, 0x0, 0x0) 19:32:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60170000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1605bfa3) 19:32:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 19:32:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x600000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xd801000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60180000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x162c7522) 19:32:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x700000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) 19:32:59 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x4]) syz_open_dev$mice(0x0, 0x0, 0x0) 19:32:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xe503000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60190000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x7ffffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) 19:32:59 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x162d5d05) 19:32:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xf402000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x8, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000100)={r0, 0x57456c5c, 0x2, "30af5e7a84"}) syz_open_dev$mice(0x0, 0x0, 0x101000) 19:32:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x48) 19:32:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x601a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xfe03000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x800000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:32:59 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1668e125) 19:32:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x48) 19:32:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xff00000000000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x8, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000100)={r0, 0x57456c5c, 0x2, "30af5e7a84"}) syz_open_dev$mice(0x0, 0x0, 0x101000) 19:32:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x601b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:32:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x900000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x48) 19:33:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0xffffffff00000000, 0x0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xa00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:00 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x168a1c1b) 19:33:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x601c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000040)) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x8, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000100)={r0, 0x57456c5c, 0x2, "30af5e7a84"}) syz_open_dev$mice(0x0, 0x0, 0x101000) 19:33:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}, 0x48) 19:33:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xb00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:00 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x16eb7539) 19:33:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x601d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x601e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6e}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x4, 0xc2cb]) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x2, "30af5e7a84"}) syz_open_dev$mice(0x0, 0x0, 0x0) 19:33:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 19:33:00 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1702cbc2) 19:33:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xc00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2500]}, 0x48) 19:33:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xd00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x601f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x5, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x173601b6) 19:33:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2700]}, 0x48) 19:33:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xf00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60200000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x173c718a) 19:33:00 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2c02]}, 0x48) 19:33:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60220000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfffffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:00 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1969cdb3) 19:33:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 19:33:00 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1973e080) 19:33:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x8, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1000000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60230000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 19:33:01 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60240000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 19:33:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x9, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1980c81b) 19:33:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1100000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) 19:33:01 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60250000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 19:33:01 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x199881c3) 19:33:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1200000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60260000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 19:33:01 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) 19:33:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xb, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1300000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:01 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x19b3d2d3) 19:33:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60270000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1400000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:01 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) 19:33:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) 19:33:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xc, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x19b9d94d) 19:33:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60280000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1700000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xd, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) 19:33:01 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) 19:33:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60290000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1aa588df) 19:33:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1800000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7d03]}, 0x48) 19:33:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:01 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x320f) 19:33:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x602a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9c01]}, 0x48) 19:33:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1900000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:02 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1af0f5f2) 19:33:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x10, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1a00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:02 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x320f) 19:33:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa002]}, 0x48) 19:33:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x602b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1b015b5e) 19:33:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x11, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x320f) 19:33:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc200]}, 0x48) 19:33:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x602c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x12, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1b00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x602d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xcc03]}, 0x48) 19:33:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1c00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:02 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1b19b38a) 19:33:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x25, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x602e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x27, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xcf01]}, 0x48) 19:33:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1d00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:02 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1b1c8a16) 19:33:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x602f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x48, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd801]}, 0x48) 19:33:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1f00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60300000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4c, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:02 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1b32ca45) 19:33:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x1fffffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf402]}, 0x48) 19:33:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60310000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x68, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 0: pipe(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf403]}, 0x48) 19:33:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60320000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2100000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6c, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc03]}, 0x48) 19:33:03 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1b35d8a5) 19:33:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2200000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:03 executing program 0: pipe(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60330000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x74, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 19:33:03 executing program 0: pipe(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:03 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1b58d46a) 19:33:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60340000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1d000]}, 0x48) 19:33:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7a, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2300000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60350000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}, 0x48) 19:33:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:03 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1b8fc671) 19:33:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2400000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60360000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xc2, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 19:33:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:03 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1b9ade20) 19:33:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2500000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x105, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60370000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd00100]}, 0x48) 19:33:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2600000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:03 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1bc88019) 19:33:03 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x0) sendfile(r0, r1, 0x0, 0x320f) 19:33:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60380000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x174, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 19:33:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2700000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 19:33:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x19c, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60390000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1bd49492) 19:33:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2800000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1d8, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x0) sendfile(r0, r1, 0x0, 0x320f) 19:33:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x603a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 19:33:04 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x0) sendfile(r0, r1, 0x0, 0x320f) 19:33:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x22c, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1c007823) 19:33:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 19:33:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x2900000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x603b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 0: pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:04 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1c163e9a) 19:33:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2a0, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 19:33:04 executing program 0: pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x603c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3f00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5010000]}, 0x48) 19:33:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2f4, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 0: pipe(&(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x320f) 19:33:04 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1c631347) 19:33:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x3fffffffffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x603d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 19:33:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x4000000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x603f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x320f) 19:33:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x300, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1ced3400) 19:33:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 19:33:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60400000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x320f) 19:33:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x4400000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x37d, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:04 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1d26c523) 19:33:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60410000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 19:33:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3e5, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x320f) 19:33:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x7f00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60420000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) 19:33:05 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1d3a9c7f) 19:33:05 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x0) 19:33:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3fe, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xe0ffffff00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60430000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 19:33:05 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1d62a95e) 19:33:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) 19:33:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x500, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x0) 19:33:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfc00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60440000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) 19:33:05 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1dc08da9) 19:33:05 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x0) 19:33:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x501, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0x48) 19:33:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfe80000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60450000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfe80ffff00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:05 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1de1ba30) 19:33:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x600, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) 19:33:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfe88000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60460000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x48) 19:33:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x700, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:05 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1dff3d30) 19:33:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0x18, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB='#'], 0x1) 19:33:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xfec0ffff00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 19:33:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x60470000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1e62249f) 19:33:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x900, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xff00000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x48) 19:33:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80000000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1e6de4b7) 19:33:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80010000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 0: 19:33:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xff01000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}, 0x48) 19:33:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xb00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80020000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1ee3a629) 19:33:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xc00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xff03000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 19:33:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80030000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)='configfs\x00', 0x0, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0/file0\x00') 19:33:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xd00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000003200)=""/4096) 19:33:06 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1f6054ae) 19:33:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x25000000]}, 0x48) 19:33:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xff07000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80040000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000]}, 0x48) 19:33:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xff0f000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:06 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x1f607d53) 19:33:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80050000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0x0, 0x7f]) 19:33:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1100, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xff1f000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2c020000]}, 0x48) 19:33:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80060000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 19:33:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1200, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:06 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2005f738) 19:33:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xff3f000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80070000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0x0, 0x7f]) 19:33:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xff7f000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 19:33:07 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x201536f3) 19:33:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80080000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0/file0\x00') 19:33:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 19:33:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x400000001, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000580)=[{0x48000015, 0x0, 0x0, 0x40000}, {0x6}]}) 19:33:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80090000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:07 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2035134f) 19:33:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2500, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff000000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2810.158766][ T26] audit: type=1326 audit(1564601587.303:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=8476 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 19:33:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff010000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x800a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x48) 19:33:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2700, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff030000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x800b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x48) 19:33:08 executing program 0: 19:33:08 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x20635f30) 19:33:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2c02, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) 19:33:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff070000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x800c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2810.955526][ T26] audit: type=1326 audit(1564601588.103:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=8476 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c66a code=0x0 19:33:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) 19:33:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3f00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff0f0000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:08 executing program 0: 19:33:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x800d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 0: 19:33:08 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x20de9a1b) 19:33:08 executing program 0: 19:33:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x800e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff1f0000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) 19:33:08 executing program 0: 19:33:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff3f0000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:08 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2122bbf7) 19:33:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4800, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x800f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 0: 19:33:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7d030000]}, 0x48) 19:33:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffff7f0000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9c010000]}, 0x48) 19:33:08 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$chown(0x4, r0, 0x0, 0x0) 19:33:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80100000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2167a363) 19:33:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4c00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa0020000]}, 0x48) 19:33:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80110000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffff0000000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:08 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2182c22d) 19:33:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6800, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffff0100000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:08 executing program 0: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="5500000018007f5300fe01b2a4a280930a600000ffa84308910000003900080008000a00010000000000156f757284366a660006000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000", 0x55}], 0x1}, 0x0) 19:33:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80120000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc2000000]}, 0x48) [ 2811.828485][ T8621] IPv6: NLM_F_REPLACE set, but no existing node found! 19:33:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6c00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xcc030000]}, 0x48) 19:33:09 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x219380d4) 19:33:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffff0300000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80130000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2811.898059][ T8636] IPv6: NLM_F_REPLACE set, but no existing node found! 19:33:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r3 = dup(r1) bind$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r1, r4, 0x0, 0x1000003) 19:33:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7400, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xcf010000]}, 0x48) 19:33:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffff0700000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80140000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x21a5c5b3) 19:33:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) write$P9_RREMOVE(r0, &(0x7f0000000080)={0x7}, 0x7) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) read(r1, &(0x7f0000000000)=""/81, 0xffffffd5) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 19:33:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd8010000]}, 0x48) 19:33:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7401, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80160000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffff0f00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2812.211288][ T26] audit: type=1804 audit(1564601589.353:56): pid=8678 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441541541/syzkaller.5lexBS/14452/memory.events" dev="sda1" ino=16641 res=1 19:33:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7a00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf4020000]}, 0x48) 19:33:09 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x21e9e556) 19:33:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80170000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffff1f00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2812.335513][ T26] audit: type=1800 audit(1564601589.383:57): pid=8678 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16641 res=0 19:33:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7d03, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf4030000]}, 0x48) [ 2812.459629][ T26] audit: type=1804 audit(1564601589.393:58): pid=8678 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir441541541/syzkaller.5lexBS/14452/memory.events" dev="sda1" ino=16641 res=1 19:33:09 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2264346f) 19:33:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80180000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc030000]}, 0x48) 19:33:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x9c01, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000000002, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) fallocate(0xffffffffffffffff, 0x0, 0x4, 0xc3) accept$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffc6d, &(0x7f00000000c0)=0x5) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getpid() pread64(r0, 0x0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x77359400}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000002c0)=""/84) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x1000000000003ffc, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) 19:33:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffff3f00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2812.626802][ T26] audit: type=1804 audit(1564601589.773:59): pid=8678 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441541541/syzkaller.5lexBS/14452/memory.events" dev="sda1" ino=16641 res=1 [ 2812.658991][ T26] audit: type=1800 audit(1564601589.773:60): pid=8678 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16641 res=0 19:33:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 19:33:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa002, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffff7f00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80190000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:09 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x22752c16) 19:33:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 19:33:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x801b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2284cf00) 19:33:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffff00000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x8000000000000002, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) fallocate(0xffffffffffffffff, 0x0, 0x4, 0xc3) accept$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffc6d, &(0x7f00000000c0)=0x5) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getpid() pread64(r0, 0x0, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x77359400}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000002c0)=""/84) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x1000000000003ffc, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) 19:33:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xc200, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}, 0x48) 19:33:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x801c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffff01000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:10 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x22c1b05b) 19:33:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xd801, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x801d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 19:33:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffff03000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:10 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x236739c1) 19:33:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x801e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80040000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffff07000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe503, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd0010000000000]}, 0x48) 19:33:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x801f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2378001c) 19:33:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80200000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffff0f000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 19:33:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xf402, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="eb0000001add0000840019bae3c9ba566500000000000000"], &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000100)) 19:33:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80210000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 19:33:10 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x23865b57) 19:33:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffff1f000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xfe03, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x20250000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 19:33:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80220000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffff3f000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:10 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x23c5261d) 19:33:10 executing program 0 (fault-call:3 fault-nth:0): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xff00, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 19:33:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80230000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffff7f000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2813.839489][ T8871] FAULT_INJECTION: forcing a failure. [ 2813.839489][ T8871] name failslab, interval 1, probability 0, space 0, times 0 19:33:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x40000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) [ 2813.912588][ T8871] CPU: 0 PID: 8871 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2813.920513][ T8871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2813.930659][ T8871] Call Trace: [ 2813.933961][ T8871] dump_stack+0x1d8/0x2f8 [ 2813.938302][ T8871] should_fail+0x608/0x860 [ 2813.942816][ T8871] ? setup_fault_attr+0x2b0/0x2b0 [ 2813.948189][ T8871] __should_failslab+0x11a/0x160 [ 2813.948200][ T8871] should_failslab+0x9/0x20 [ 2813.948210][ T8871] kmem_cache_alloc_trace+0x5d/0x2f0 [ 2813.948226][ T8871] ? alloc_pipe_info+0xae/0x3f0 [ 2813.957664][ T8871] alloc_pipe_info+0xae/0x3f0 [ 2813.957678][ T8871] splice_direct_to_actor+0x98b/0xb40 [ 2813.977832][ T8871] ? rcu_lock_release+0xd/0x30 [ 2813.982635][ T8871] ? __lock_acquire+0x4750/0x4750 [ 2813.987670][ T8871] ? do_splice_direct+0x3d0/0x3d0 [ 2813.992721][ T8871] ? pipe_to_sendpage+0x310/0x310 [ 2813.997787][ T8871] ? rw_verify_area+0x1c2/0x360 [ 2814.002652][ T8871] ? rcu_lock_release+0x26/0x30 [ 2814.007514][ T8871] do_splice_direct+0x279/0x3d0 19:33:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x501000000000000]}, 0x48) [ 2814.012371][ T8871] ? splice_direct_to_actor+0xb40/0xb40 [ 2814.012386][ T8871] ? security_file_permission+0x148/0x350 [ 2814.012397][ T8871] do_sendfile+0x8a3/0x1110 [ 2814.012412][ T8871] ? compat_writev+0x390/0x390 [ 2814.012421][ T8871] ? __kasan_check_write+0x14/0x20 [ 2814.012429][ T8871] ? fput_many+0x47/0x1a0 [ 2814.012436][ T8871] ? check_preemption_disabled+0xb7/0x2a0 [ 2814.012444][ T8871] ? debug_smp_processor_id+0x1c/0x20 [ 2814.012454][ T8871] __x64_sys_sendfile64+0x1bc/0x220 [ 2814.012464][ T8871] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2814.012476][ T8871] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2814.028214][ T8871] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2814.028223][ T8871] ? trace_hardirqs_off_caller+0x58/0x80 [ 2814.028240][ T8871] ? do_syscall_64+0x1d/0x140 [ 2814.053995][ T8871] do_syscall_64+0xfe/0x140 [ 2814.054008][ T8871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2814.054016][ T8871] RIP: 0033:0x459829 [ 2814.054026][ T8871] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2814.054031][ T8871] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2814.054038][ T8871] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2814.054042][ T8871] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2814.054047][ T8871] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2814.054057][ T8871] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 19:33:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80240000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x200000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80250000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x23db7770) [ 2814.070226][ T8871] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:11 executing program 0 (fault-call:3 fault-nth:1): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80260000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 19:33:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80270000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x24172df9) 19:33:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 19:33:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff010000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2814.347548][ T8919] FAULT_INJECTION: forcing a failure. [ 2814.347548][ T8919] name failslab, interval 1, probability 0, space 0, times 0 19:33:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) [ 2814.459063][ T8919] CPU: 0 PID: 8919 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2814.466991][ T8919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2814.477055][ T8919] Call Trace: [ 2814.480354][ T8919] dump_stack+0x1d8/0x2f8 [ 2814.484709][ T8919] should_fail+0x608/0x860 [ 2814.489227][ T8919] ? setup_fault_attr+0x2b0/0x2b0 [ 2814.494286][ T8919] ? kcalloc+0x36/0x60 [ 2814.498364][ T8919] __should_failslab+0x11a/0x160 [ 2814.503310][ T8919] ? kcalloc+0x36/0x60 19:33:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x48) [ 2814.507384][ T8919] should_failslab+0x9/0x20 [ 2814.511898][ T8919] __kmalloc+0x7a/0x340 [ 2814.516055][ T8919] kcalloc+0x36/0x60 [ 2814.519952][ T8919] alloc_pipe_info+0x1ce/0x3f0 [ 2814.524729][ T8919] splice_direct_to_actor+0x98b/0xb40 [ 2814.530282][ T8919] ? rcu_lock_release+0xd/0x30 [ 2814.535059][ T8919] ? __lock_acquire+0x4750/0x4750 [ 2814.540088][ T8919] ? do_splice_direct+0x3d0/0x3d0 [ 2814.545301][ T8919] ? pipe_to_sendpage+0x310/0x310 [ 2814.550731][ T8919] ? rw_verify_area+0x1c2/0x360 [ 2814.555588][ T8919] ? rcu_lock_release+0x26/0x30 [ 2814.560568][ T8919] do_splice_direct+0x279/0x3d0 [ 2814.565429][ T8919] ? splice_direct_to_actor+0xb40/0xb40 [ 2814.570984][ T8919] ? security_file_permission+0x148/0x350 [ 2814.576711][ T8919] do_sendfile+0x8a3/0x1110 [ 2814.581225][ T8919] ? compat_writev+0x390/0x390 [ 2814.586076][ T8919] ? __kasan_check_write+0x14/0x20 [ 2814.591186][ T8919] ? fput_many+0x47/0x1a0 [ 2814.595503][ T8919] ? check_preemption_disabled+0xb7/0x2a0 [ 2814.595513][ T8919] ? debug_smp_processor_id+0x1c/0x20 [ 2814.595522][ T8919] __x64_sys_sendfile64+0x1bc/0x220 [ 2814.595533][ T8919] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2814.595541][ T8919] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2814.595548][ T8919] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2814.595555][ T8919] ? trace_hardirqs_off_caller+0x58/0x80 [ 2814.595565][ T8919] ? do_syscall_64+0x1d/0x140 [ 2814.595575][ T8919] do_syscall_64+0xfe/0x140 [ 2814.595588][ T8919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2814.606918][ T8919] RIP: 0033:0x459829 19:33:11 executing program 0 (fault-call:3 fault-nth:2): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 19:33:11 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x25000000) 19:33:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80280000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff030000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2814.606927][ T8919] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2814.606931][ T8919] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2814.606939][ T8919] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2814.606942][ T8919] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2814.606947][ T8919] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:33:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x48) 19:33:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff070000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2814.606951][ T8919] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2814.606955][ T8919] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 [ 2814.707949][ T8947] FAULT_INJECTION: forcing a failure. [ 2814.707949][ T8947] name failslab, interval 1, probability 0, space 0, times 0 [ 2814.804646][ T8947] CPU: 1 PID: 8947 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2814.812579][ T8947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2814.822636][ T8947] Call Trace: [ 2814.825930][ T8947] dump_stack+0x1d8/0x2f8 [ 2814.830240][ T8947] should_fail+0x608/0x860 [ 2814.834634][ T8947] ? setup_fault_attr+0x2b0/0x2b0 [ 2814.839633][ T8947] ? lock_acquire+0x158/0x250 [ 2814.844292][ T8947] __should_failslab+0x11a/0x160 [ 2814.850772][ T8947] should_failslab+0x9/0x20 [ 2814.855961][ T8947] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 2814.861668][ T8947] ? __kmalloc_node+0x3c/0x60 [ 2814.866318][ T8947] ? stack_trace_snprint+0x150/0x150 [ 2814.871592][ T8947] __kmalloc_node+0x3c/0x60 [ 2814.876070][ T8947] kvmalloc_node+0xcc/0x130 [ 2814.880566][ T8947] iov_iter_get_pages_alloc+0x87d/0xc50 [ 2814.886355][ T8947] default_file_splice_read+0x187/0x9e0 [ 2814.891890][ T8947] ? do_splice_direct+0x279/0x3d0 [ 2814.896901][ T8947] ? do_sendfile+0x8a3/0x1110 [ 2814.901644][ T8947] ? __x64_sys_sendfile64+0x1bc/0x220 [ 2814.906990][ T8947] ? do_syscall_64+0xfe/0x140 [ 2814.911653][ T8947] ? __ia32_sys_tee+0xb0/0xb0 [ 2814.916316][ T8947] ? memset+0x31/0x40 [ 2814.920274][ T8947] ? fsnotify+0x14b9/0x1580 [ 2814.924768][ T8947] ? lockdep_unregister_key+0x660/0x660 [ 2814.930597][ T8947] ? trace_lock_acquire+0x159/0x1d0 [ 2814.935772][ T8947] ? __lock_acquire+0x4750/0x4750 [ 2814.940785][ T8947] ? __fsnotify_parent+0x300/0x300 [ 2814.945881][ T8947] ? rw_verify_area+0x1c2/0x360 [ 2814.952159][ T8947] ? __ia32_sys_tee+0xb0/0xb0 [ 2814.956814][ T8947] splice_direct_to_actor+0x3ff/0xb40 [ 2814.962192][ T8947] ? do_splice_direct+0x3d0/0x3d0 [ 2814.967191][ T8947] ? pipe_to_sendpage+0x310/0x310 [ 2814.972197][ T8947] ? rw_verify_area+0x1c2/0x360 [ 2814.977026][ T8947] ? rcu_lock_release+0x26/0x30 [ 2814.981936][ T8947] do_splice_direct+0x279/0x3d0 [ 2814.986774][ T8947] ? splice_direct_to_actor+0xb40/0xb40 [ 2814.993856][ T8947] ? security_file_permission+0x148/0x350 [ 2814.999839][ T8947] do_sendfile+0x8a3/0x1110 [ 2815.004378][ T8947] ? compat_writev+0x390/0x390 [ 2815.009130][ T8947] ? __kasan_check_write+0x14/0x20 [ 2815.014306][ T8947] ? fput_many+0x47/0x1a0 [ 2815.018631][ T8947] ? check_preemption_disabled+0xb7/0x2a0 [ 2815.024335][ T8947] ? debug_smp_processor_id+0x1c/0x20 [ 2815.029695][ T8947] __x64_sys_sendfile64+0x1bc/0x220 [ 2815.034882][ T8947] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2815.040664][ T8947] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2815.045765][ T8947] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2815.053019][ T8947] ? trace_hardirqs_off_caller+0x58/0x80 [ 2815.058637][ T8947] ? do_syscall_64+0x1d/0x140 [ 2815.063650][ T8947] do_syscall_64+0xfe/0x140 [ 2815.068136][ T8947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2815.074009][ T8947] RIP: 0033:0x459829 [ 2815.077881][ T8947] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2815.097476][ T8947] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 19:33:12 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x25e16816) 19:33:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80290000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2815.105865][ T8947] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2815.113902][ T8947] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2815.121857][ T8947] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2815.129825][ T8947] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2815.137784][ T8947] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x48) 19:33:12 executing program 0 (fault-call:3 fault-nth:3): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x5000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff0f0000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:12 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x25eb75e4) 19:33:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x48) 19:33:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x5010000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff1f0000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2815.369850][ T8988] FAULT_INJECTION: forcing a failure. [ 2815.369850][ T8988] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2815.392887][ T8988] CPU: 0 PID: 8988 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2815.400807][ T8988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2815.410861][ T8988] Call Trace: [ 2815.414155][ T8988] dump_stack+0x1d8/0x2f8 [ 2815.418496][ T8988] should_fail+0x608/0x860 [ 2815.422915][ T8988] ? setup_fault_attr+0x2b0/0x2b0 [ 2815.427954][ T8988] should_fail_alloc_page+0x55/0x60 [ 2815.433162][ T8988] prepare_alloc_pages+0x283/0x470 [ 2815.438278][ T8988] __alloc_pages_nodemask+0x11c/0x790 [ 2815.443650][ T8988] ? do_splice_direct+0x279/0x3d0 [ 2815.443661][ T8988] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2815.443671][ T8988] ? kvmalloc_node+0xcc/0x130 [ 2815.443678][ T8988] ? default_file_splice_read+0x187/0x9e0 19:33:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff3f0000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffff7f0000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2815.443685][ T8988] ? do_splice_direct+0x279/0x3d0 [ 2815.443697][ T8988] ? trace_lock_release+0x135/0x1a0 [ 2815.443709][ T8988] alloc_pages_current+0x2db/0x500 [ 2815.443724][ T8988] push_pipe+0x3b1/0x750 [ 2815.455285][ T8988] __pipe_get_pages+0xd2/0x420 [ 2815.455294][ T8988] ? push_pipe+0x750/0x750 [ 2815.455303][ T8988] ? kasan_kmalloc+0x9/0x10 [ 2815.455312][ T8988] ? __kmalloc_node+0x4d/0x60 [ 2815.455321][ T8988] iov_iter_get_pages_alloc+0x89b/0xc50 [ 2815.455332][ T8988] default_file_splice_read+0x187/0x9e0 [ 2815.455339][ T8988] ? do_splice_direct+0x279/0x3d0 19:33:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff0000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2815.455348][ T8988] ? do_sendfile+0x8a3/0x1110 [ 2815.455355][ T8988] ? __x64_sys_sendfile64+0x1bc/0x220 [ 2815.455364][ T8988] ? do_syscall_64+0xfe/0x140 [ 2815.455373][ T8988] ? __ia32_sys_tee+0xb0/0xb0 [ 2815.455383][ T8988] ? memset+0x31/0x40 [ 2815.455392][ T8988] ? fsnotify+0x14b9/0x1580 [ 2815.455405][ T8988] ? lockdep_unregister_key+0x660/0x660 [ 2815.553968][ T8988] ? trace_lock_acquire+0x159/0x1d0 [ 2815.559273][ T8988] ? __lock_acquire+0x4750/0x4750 [ 2815.564312][ T8988] ? __fsnotify_parent+0x300/0x300 [ 2815.564329][ T8988] ? rw_verify_area+0x1c2/0x360 [ 2815.564337][ T8988] ? __ia32_sys_tee+0xb0/0xb0 [ 2815.564345][ T8988] splice_direct_to_actor+0x3ff/0xb40 [ 2815.564359][ T8988] ? do_splice_direct+0x3d0/0x3d0 [ 2815.564366][ T8988] ? pipe_to_sendpage+0x310/0x310 [ 2815.564379][ T8988] ? rw_verify_area+0x1c2/0x360 [ 2815.574318][ T8988] ? rcu_lock_release+0x26/0x30 [ 2815.574327][ T8988] do_splice_direct+0x279/0x3d0 [ 2815.574338][ T8988] ? splice_direct_to_actor+0xb40/0xb40 [ 2815.574352][ T8988] ? security_file_permission+0x148/0x350 [ 2815.574365][ T8988] do_sendfile+0x8a3/0x1110 [ 2815.574381][ T8988] ? compat_writev+0x390/0x390 [ 2815.574391][ T8988] ? __kasan_check_write+0x14/0x20 [ 2815.574402][ T8988] ? fput_many+0x47/0x1a0 [ 2815.639352][ T8988] ? check_preemption_disabled+0xb7/0x2a0 [ 2815.645307][ T8988] ? debug_smp_processor_id+0x1c/0x20 [ 2815.650965][ T8988] __x64_sys_sendfile64+0x1bc/0x220 [ 2815.656143][ T8988] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2815.661832][ T8988] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2815.666936][ T8988] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2815.672638][ T8988] ? trace_hardirqs_off_caller+0x58/0x80 [ 2815.678270][ T8988] ? do_syscall_64+0x1d/0x140 [ 2815.683361][ T8988] do_syscall_64+0xfe/0x140 [ 2815.687839][ T8988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2815.693718][ T8988] RIP: 0033:0x459829 [ 2815.697594][ T8988] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2815.717175][ T8988] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2815.725560][ T8988] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2815.733512][ T8988] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2815.741473][ T8988] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2815.749733][ T8988] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2815.757681][ T8988] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x802a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff0100, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:12 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x262a9a51) 19:33:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) 19:33:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:12 executing program 0 (fault-call:3 fault-nth:4): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 19:33:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x802b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2815.885012][ T9018] FAULT_INJECTION: forcing a failure. [ 2815.885012][ T9018] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:33:13 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x26c5f600) 19:33:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff0300, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2815.945632][ T9018] CPU: 0 PID: 9018 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2815.953928][ T9018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2815.953933][ T9018] Call Trace: [ 2815.953950][ T9018] dump_stack+0x1d8/0x2f8 [ 2815.953962][ T9018] should_fail+0x608/0x860 [ 2815.953973][ T9018] ? setup_fault_attr+0x2b0/0x2b0 [ 2815.953988][ T9018] should_fail_alloc_page+0x55/0x60 [ 2815.953999][ T9018] prepare_alloc_pages+0x283/0x470 19:33:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x8000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2815.954016][ T9018] __alloc_pages_nodemask+0x11c/0x790 [ 2815.996674][ T9018] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2816.002209][ T9018] ? kvmalloc_node+0xcc/0x130 [ 2816.002220][ T9018] ? default_file_splice_read+0x187/0x9e0 [ 2816.002227][ T9018] ? do_splice_direct+0x279/0x3d0 [ 2816.002239][ T9018] ? trace_lock_release+0x135/0x1a0 [ 2816.002252][ T9018] alloc_pages_current+0x2db/0x500 [ 2816.002268][ T9018] push_pipe+0x3b1/0x750 [ 2816.032116][ T9018] __pipe_get_pages+0xd2/0x420 [ 2816.032127][ T9018] ? push_pipe+0x750/0x750 [ 2816.032136][ T9018] ? kasan_kmalloc+0x9/0x10 19:33:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x48) [ 2816.032150][ T9018] ? __kmalloc_node+0x4d/0x60 [ 2816.046230][ T9018] iov_iter_get_pages_alloc+0x89b/0xc50 [ 2816.057679][ T9018] default_file_splice_read+0x187/0x9e0 [ 2816.063219][ T9018] ? do_splice_direct+0x279/0x3d0 [ 2816.068238][ T9018] ? do_sendfile+0x8a3/0x1110 [ 2816.072910][ T9018] ? __x64_sys_sendfile64+0x1bc/0x220 [ 2816.078286][ T9018] ? do_syscall_64+0xfe/0x140 [ 2816.082969][ T9018] ? __ia32_sys_tee+0xb0/0xb0 [ 2816.087651][ T9018] ? memset+0x31/0x40 [ 2816.091632][ T9018] ? fsnotify+0x14b9/0x1580 [ 2816.096133][ T9018] ? lockdep_unregister_key+0x660/0x660 [ 2816.101662][ T9018] ? trace_lock_acquire+0x159/0x1d0 [ 2816.106848][ T9018] ? __lock_acquire+0x4750/0x4750 [ 2816.111866][ T9018] ? __fsnotify_parent+0x300/0x300 [ 2816.116975][ T9018] ? rw_verify_area+0x1c2/0x360 [ 2816.121801][ T9018] ? __ia32_sys_tee+0xb0/0xb0 [ 2816.126451][ T9018] splice_direct_to_actor+0x3ff/0xb40 [ 2816.131800][ T9018] ? do_splice_direct+0x3d0/0x3d0 [ 2816.136805][ T9018] ? pipe_to_sendpage+0x310/0x310 [ 2816.141804][ T9018] ? rw_verify_area+0x1c2/0x360 [ 2816.146628][ T9018] ? rcu_lock_release+0x26/0x30 [ 2816.151844][ T9018] do_splice_direct+0x279/0x3d0 [ 2816.156670][ T9018] ? splice_direct_to_actor+0xb40/0xb40 [ 2816.162201][ T9018] ? security_file_permission+0x148/0x350 [ 2816.167900][ T9018] do_sendfile+0x8a3/0x1110 [ 2816.172382][ T9018] ? compat_writev+0x390/0x390 [ 2816.177811][ T9018] ? __kasan_check_write+0x14/0x20 [ 2816.182906][ T9018] ? fput_many+0x47/0x1a0 [ 2816.187209][ T9018] ? check_preemption_disabled+0xb7/0x2a0 [ 2816.192901][ T9018] ? debug_smp_processor_id+0x1c/0x20 [ 2816.198246][ T9018] __x64_sys_sendfile64+0x1bc/0x220 [ 2816.203422][ T9018] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2816.209113][ T9018] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2816.214196][ T9018] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2816.219888][ T9018] ? trace_hardirqs_off_caller+0x58/0x80 [ 2816.225493][ T9018] ? do_syscall_64+0x1d/0x140 [ 2816.230159][ T9018] do_syscall_64+0xfe/0x140 [ 2816.234636][ T9018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2816.240587][ T9018] RIP: 0033:0x459829 [ 2816.244462][ T9018] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2816.264414][ T9018] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2816.272812][ T9018] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2816.280757][ T9018] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2816.288713][ T9018] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2816.296665][ T9018] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2816.304611][ T9018] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x9000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:13 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x27117c47) 19:33:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff0700, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}, 0x48) 19:33:13 executing program 0 (fault-call:3 fault-nth:5): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x802c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff0f00, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:13 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2806c2f9) 19:33:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) [ 2816.526043][ T9060] FAULT_INJECTION: forcing a failure. [ 2816.526043][ T9060] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:33:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xb000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x802d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2816.631255][ T9060] CPU: 0 PID: 9060 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2816.639176][ T9060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2816.649783][ T9060] Call Trace: [ 2816.653063][ T9060] dump_stack+0x1d8/0x2f8 [ 2816.653077][ T9060] should_fail+0x608/0x860 [ 2816.653089][ T9060] ? setup_fault_attr+0x2b0/0x2b0 [ 2816.653102][ T9060] should_fail_alloc_page+0x55/0x60 [ 2816.653113][ T9060] prepare_alloc_pages+0x283/0x470 [ 2816.653124][ T9060] __alloc_pages_nodemask+0x11c/0x790 [ 2816.653137][ T9060] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2816.653150][ T9060] ? kvmalloc_node+0xcc/0x130 [ 2816.692715][ T9060] ? default_file_splice_read+0x187/0x9e0 [ 2816.698411][ T9060] ? do_splice_direct+0x279/0x3d0 [ 2816.703415][ T9060] ? trace_lock_release+0x135/0x1a0 [ 2816.708592][ T9060] alloc_pages_current+0x2db/0x500 [ 2816.713682][ T9060] push_pipe+0x3b1/0x750 [ 2816.717898][ T9060] __pipe_get_pages+0xd2/0x420 [ 2816.722633][ T9060] ? push_pipe+0x750/0x750 [ 2816.727024][ T9060] ? kasan_kmalloc+0x9/0x10 [ 2816.731501][ T9060] ? __kmalloc_node+0x4d/0x60 [ 2816.736151][ T9060] iov_iter_get_pages_alloc+0x89b/0xc50 [ 2816.741673][ T9060] default_file_splice_read+0x187/0x9e0 [ 2816.747190][ T9060] ? do_splice_direct+0x279/0x3d0 [ 2816.752770][ T9060] ? do_sendfile+0x8a3/0x1110 [ 2816.764714][ T9060] ? __x64_sys_sendfile64+0x1bc/0x220 [ 2816.770066][ T9060] ? do_syscall_64+0xfe/0x140 [ 2816.774721][ T9060] ? __ia32_sys_tee+0xb0/0xb0 [ 2816.779372][ T9060] ? memset+0x31/0x40 [ 2816.783327][ T9060] ? fsnotify+0x14b9/0x1580 [ 2816.787810][ T9060] ? lockdep_unregister_key+0x660/0x660 [ 2816.793344][ T9060] ? trace_lock_acquire+0x159/0x1d0 [ 2816.798609][ T9060] ? __lock_acquire+0x4750/0x4750 [ 2816.803606][ T9060] ? __fsnotify_parent+0x300/0x300 [ 2816.808711][ T9060] ? rw_verify_area+0x1c2/0x360 [ 2816.813536][ T9060] ? __ia32_sys_tee+0xb0/0xb0 [ 2816.818189][ T9060] splice_direct_to_actor+0x3ff/0xb40 [ 2816.823798][ T9060] ? do_splice_direct+0x3d0/0x3d0 [ 2816.828881][ T9060] ? pipe_to_sendpage+0x310/0x310 [ 2816.833879][ T9060] ? rw_verify_area+0x1c2/0x360 [ 2816.838704][ T9060] ? rcu_lock_release+0x26/0x30 [ 2816.843526][ T9060] do_splice_direct+0x279/0x3d0 [ 2816.848351][ T9060] ? splice_direct_to_actor+0xb40/0xb40 [ 2816.854267][ T9060] ? security_file_permission+0x148/0x350 [ 2816.859963][ T9060] do_sendfile+0x8a3/0x1110 [ 2816.864449][ T9060] ? compat_writev+0x390/0x390 [ 2816.869188][ T9060] ? __kasan_check_write+0x14/0x20 [ 2816.874360][ T9060] ? fput_many+0x47/0x1a0 [ 2816.878660][ T9060] ? check_preemption_disabled+0xb7/0x2a0 [ 2816.884351][ T9060] ? debug_smp_processor_id+0x1c/0x20 [ 2816.889783][ T9060] __x64_sys_sendfile64+0x1bc/0x220 [ 2816.894957][ T9060] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2816.900647][ T9060] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2816.905730][ T9060] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2816.911433][ T9060] ? trace_hardirqs_off_caller+0x58/0x80 [ 2816.917045][ T9060] ? do_syscall_64+0x1d/0x140 [ 2816.921708][ T9060] do_syscall_64+0xfe/0x140 [ 2816.926188][ T9060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2816.932052][ T9060] RIP: 0033:0x459829 [ 2816.935923][ T9060] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2816.955881][ T9060] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2816.964265][ T9060] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2816.972207][ T9060] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 19:33:14 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x28b6106b) 19:33:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff1f00, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2500000000000000]}, 0x48) 19:33:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xc000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2816.980150][ T9060] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2816.988093][ T9060] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2816.996863][ T9060] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:14 executing program 0 (fault-call:3 fault-nth:6): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2700000000000000]}, 0x48) 19:33:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x802e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff3f00, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xd000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:14 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x291bb175) 19:33:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2c02000000000000]}, 0x48) 19:33:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2817.234914][ T9109] FAULT_INJECTION: forcing a failure. [ 2817.234914][ T9109] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2817.259536][ T9109] CPU: 1 PID: 9109 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2817.267444][ T9109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2817.277483][ T9109] Call Trace: [ 2817.277501][ T9109] dump_stack+0x1d8/0x2f8 [ 2817.277512][ T9109] should_fail+0x608/0x860 [ 2817.277522][ T9109] ? setup_fault_attr+0x2b0/0x2b0 [ 2817.277537][ T9109] should_fail_alloc_page+0x55/0x60 [ 2817.300139][ T9109] prepare_alloc_pages+0x283/0x470 [ 2817.305347][ T9109] __alloc_pages_nodemask+0x11c/0x790 [ 2817.310728][ T9109] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2817.316272][ T9109] ? kvmalloc_node+0xcc/0x130 [ 2817.320948][ T9109] ? default_file_splice_read+0x187/0x9e0 [ 2817.326661][ T9109] ? do_splice_direct+0x279/0x3d0 [ 2817.331689][ T9109] ? trace_lock_release+0x135/0x1a0 [ 2817.336887][ T9109] alloc_pages_current+0x2db/0x500 [ 2817.341998][ T9109] push_pipe+0x3b1/0x750 [ 2817.346240][ T9109] __pipe_get_pages+0xd2/0x420 [ 2817.352510][ T9109] ? push_pipe+0x750/0x750 [ 2817.356924][ T9109] ? kasan_kmalloc+0x9/0x10 [ 2817.361425][ T9109] ? __kmalloc_node+0x4d/0x60 [ 2817.366101][ T9109] iov_iter_get_pages_alloc+0x89b/0xc50 [ 2817.371645][ T9109] default_file_splice_read+0x187/0x9e0 [ 2817.377202][ T9109] ? do_splice_direct+0x279/0x3d0 [ 2817.382229][ T9109] ? do_sendfile+0x8a3/0x1110 [ 2817.386909][ T9109] ? __x64_sys_sendfile64+0x1bc/0x220 [ 2817.392273][ T9109] ? do_syscall_64+0xfe/0x140 [ 2817.396946][ T9109] ? __ia32_sys_tee+0xb0/0xb0 [ 2817.401621][ T9109] ? memset+0x31/0x40 [ 2817.405601][ T9109] ? fsnotify+0x14b9/0x1580 [ 2817.410107][ T9109] ? lockdep_unregister_key+0x660/0x660 [ 2817.415654][ T9109] ? trace_lock_acquire+0x159/0x1d0 [ 2817.420844][ T9109] ? __lock_acquire+0x4750/0x4750 [ 2817.425863][ T9109] ? __fsnotify_parent+0x300/0x300 [ 2817.430981][ T9109] ? rw_verify_area+0x1c2/0x360 [ 2817.435853][ T9109] ? __ia32_sys_tee+0xb0/0xb0 [ 2817.435864][ T9109] splice_direct_to_actor+0x3ff/0xb40 [ 2817.435880][ T9109] ? do_splice_direct+0x3d0/0x3d0 [ 2817.435888][ T9109] ? pipe_to_sendpage+0x310/0x310 [ 2817.435905][ T9109] ? rw_verify_area+0x1c2/0x360 [ 2817.445906][ T9109] ? rcu_lock_release+0x26/0x30 [ 2817.445917][ T9109] do_splice_direct+0x279/0x3d0 [ 2817.445927][ T9109] ? splice_direct_to_actor+0xb40/0xb40 [ 2817.445941][ T9109] ? security_file_permission+0x148/0x350 [ 2817.445953][ T9109] do_sendfile+0x8a3/0x1110 [ 2817.486471][ T9109] ? compat_writev+0x390/0x390 [ 2817.491236][ T9109] ? __kasan_check_write+0x14/0x20 [ 2817.496347][ T9109] ? fput_many+0x47/0x1a0 [ 2817.500676][ T9109] ? check_preemption_disabled+0xb7/0x2a0 [ 2817.506397][ T9109] ? debug_smp_processor_id+0x1c/0x20 [ 2817.511771][ T9109] __x64_sys_sendfile64+0x1bc/0x220 [ 2817.516968][ T9109] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2817.522678][ T9109] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2817.522689][ T9109] ? trace_irq_disable_rcuidle+0x23/0x1e0 19:33:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffff7f00, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x10000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffffff00, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x11000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2817.522697][ T9109] ? trace_hardirqs_off_caller+0x58/0x80 [ 2817.522711][ T9109] ? do_syscall_64+0x1d/0x140 [ 2817.533492][ T9109] do_syscall_64+0xfe/0x140 [ 2817.533503][ T9109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2817.533511][ T9109] RIP: 0033:0x459829 [ 2817.533520][ T9109] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:33:14 executing program 0 (fault-call:3 fault-nth:7): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffffff01, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x12000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x802f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 19:33:14 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x291f0d2a) [ 2817.533528][ T9109] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2817.587467][ T9109] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2817.595421][ T9109] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2817.595426][ T9109] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2817.595430][ T9109] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2817.595435][ T9109] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80300000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x20000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffffff03, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2817.679663][ T9143] FAULT_INJECTION: forcing a failure. [ 2817.679663][ T9143] name failslab, interval 1, probability 0, space 0, times 0 19:33:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 19:33:14 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x29748109) 19:33:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80310000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2817.790758][ T9143] CPU: 1 PID: 9143 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2817.798768][ T9143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2817.808819][ T9143] Call Trace: [ 2817.812115][ T9143] dump_stack+0x1d8/0x2f8 [ 2817.816444][ T9143] should_fail+0x608/0x860 [ 2817.820843][ T9143] ? setup_fault_attr+0x2b0/0x2b0 [ 2817.826898][ T9143] ? __lock_acquire+0x4750/0x4750 [ 2817.831922][ T9143] __should_failslab+0x11a/0x160 [ 2817.836846][ T9143] should_failslab+0x9/0x20 [ 2817.841339][ T9143] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 2817.847036][ T9143] ? __kmalloc_node+0x3c/0x60 [ 2817.853125][ T9143] __kmalloc_node+0x3c/0x60 [ 2817.857607][ T9143] kvmalloc_node+0xcc/0x130 [ 2817.862256][ T9143] seq_read+0x223/0xd70 [ 2817.866473][ T9143] ? _copy_from_user+0x11a/0x180 [ 2817.871386][ T9143] ? rw_verify_area+0x1c2/0x360 [ 2817.876211][ T9143] ? import_iovec+0x171/0x350 [ 2817.880863][ T9143] do_iter_read+0x4b1/0x5b0 [ 2817.885343][ T9143] vfs_readv+0x125/0x1b0 [ 2817.889569][ T9143] ? do_iter_write+0x590/0x590 [ 2817.894309][ T9143] ? push_pipe+0x750/0x750 [ 2817.898701][ T9143] ? kasan_kmalloc+0x9/0x10 [ 2817.903174][ T9143] ? __kmalloc_node+0x4d/0x60 [ 2817.908077][ T9143] ? iov_iter_get_pages_alloc+0x8b2/0xc50 [ 2817.913785][ T9143] default_file_splice_read+0x5f6/0x9e0 [ 2817.919301][ T9143] ? do_splice_direct+0x279/0x3d0 [ 2817.924297][ T9143] ? do_sendfile+0x8a3/0x1110 [ 2817.928958][ T9143] ? __x64_sys_sendfile64+0x1bc/0x220 [ 2817.934316][ T9143] ? __ia32_sys_tee+0xb0/0xb0 [ 2817.938967][ T9143] ? fsnotify+0x14b9/0x1580 [ 2817.943445][ T9143] ? lockdep_unregister_key+0x660/0x660 [ 2817.949553][ T9143] ? trace_lock_acquire+0x159/0x1d0 [ 2817.954729][ T9143] ? __lock_acquire+0x4750/0x4750 [ 2817.959727][ T9143] ? __fsnotify_parent+0x300/0x300 [ 2817.964825][ T9143] ? rw_verify_area+0x1c2/0x360 [ 2817.969647][ T9143] ? __ia32_sys_tee+0xb0/0xb0 [ 2817.974316][ T9143] splice_direct_to_actor+0x3ff/0xb40 [ 2817.979664][ T9143] ? do_splice_direct+0x3d0/0x3d0 [ 2817.984671][ T9143] ? pipe_to_sendpage+0x310/0x310 [ 2817.989681][ T9143] ? rw_verify_area+0x1c2/0x360 [ 2817.995287][ T9143] ? rcu_lock_release+0x26/0x30 [ 2818.000109][ T9143] do_splice_direct+0x279/0x3d0 [ 2818.004935][ T9143] ? splice_direct_to_actor+0xb40/0xb40 [ 2818.010455][ T9143] ? security_file_permission+0x148/0x350 [ 2818.016159][ T9143] do_sendfile+0x8a3/0x1110 [ 2818.020639][ T9143] ? compat_writev+0x390/0x390 [ 2818.025374][ T9143] ? __kasan_check_write+0x14/0x20 [ 2818.030454][ T9143] ? fput_many+0x47/0x1a0 [ 2818.034773][ T9143] ? check_preemption_disabled+0xb7/0x2a0 [ 2818.040462][ T9143] ? debug_smp_processor_id+0x1c/0x20 [ 2818.045826][ T9143] __x64_sys_sendfile64+0x1bc/0x220 [ 2818.052331][ T9143] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2818.058022][ T9143] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2818.063107][ T9143] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2818.068797][ T9143] ? trace_hardirqs_off_caller+0x58/0x80 [ 2818.074409][ T9143] ? do_syscall_64+0x1d/0x140 [ 2818.079061][ T9143] do_syscall_64+0xfe/0x140 [ 2818.083542][ T9143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2818.089406][ T9143] RIP: 0033:0x459829 [ 2818.093291][ T9143] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2818.112868][ T9143] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2818.121262][ T9143] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2818.129220][ T9143] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2818.137177][ T9143] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2818.145144][ T9143] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2818.154409][ T9143] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:15 executing program 0 (fault-call:3 fault-nth:8): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffffff07, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x25000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:15 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x29a6e31e) 19:33:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 19:33:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80320000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x27000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 19:33:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffffff0f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80330000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) [ 2818.374591][ T9185] FAULT_INJECTION: forcing a failure. [ 2818.374591][ T9185] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2818.411107][ T9185] CPU: 1 PID: 9185 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 19:33:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2c020000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2818.419024][ T9185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2818.429068][ T9185] Call Trace: [ 2818.429084][ T9185] dump_stack+0x1d8/0x2f8 [ 2818.429106][ T9185] should_fail+0x608/0x860 [ 2818.441096][ T9185] ? setup_fault_attr+0x2b0/0x2b0 [ 2818.446128][ T9185] should_fail_alloc_page+0x55/0x60 [ 2818.452584][ T9185] prepare_alloc_pages+0x283/0x470 [ 2818.452596][ T9185] __alloc_pages_nodemask+0x11c/0x790 [ 2818.452608][ T9185] ? is_bpf_text_address+0x398/0x3b0 [ 2818.452617][ T9185] ? pipe_write+0xbd/0xeb0 [ 2818.452630][ T9185] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2818.472746][ T9185] ? arch_stack_walk+0x98/0xe0 [ 2818.472760][ T9185] alloc_pages_current+0x2db/0x500 [ 2818.472775][ T9185] pipe_write+0x3fa/0xeb0 [ 2818.492466][ T9185] ? trace_lock_acquire+0x159/0x1d0 [ 2818.492484][ T9185] __vfs_write+0x617/0x7d0 [ 2818.492497][ T9185] ? debug_check_no_obj_freed+0x505/0x5b0 [ 2818.502069][ T9185] ? __kernel_write+0x350/0x350 [ 2818.512600][ T9185] ? __put_page+0xa6/0x170 [ 2818.517011][ T9185] __kernel_write+0x11d/0x350 [ 2818.521687][ T9185] write_pipe_buf+0x15b/0x1e0 [ 2818.526357][ T9185] ? splice_from_pipe_next+0xae/0x460 [ 2818.531716][ T9185] ? default_file_splice_write+0x240/0x240 [ 2818.531724][ T9185] ? default_file_splice_read+0x881/0x9e0 [ 2818.531736][ T9185] __splice_from_pipe+0x2f7/0x8a0 [ 2818.548224][ T9185] ? default_file_splice_write+0x240/0x240 [ 2818.555326][ T9185] default_file_splice_write+0x179/0x240 [ 2818.555336][ T9185] ? default_file_splice_read+0x9e0/0x9e0 [ 2818.555349][ T9185] ? default_file_splice_read+0x9e0/0x9e0 [ 2818.555356][ T9185] direct_splice_actor+0xf7/0x130 [ 2818.555369][ T9185] splice_direct_to_actor+0x4c6/0xb40 [ 2818.582760][ T9185] ? do_splice_direct+0x3d0/0x3d0 [ 2818.587768][ T9185] ? pipe_to_sendpage+0x310/0x310 [ 2818.592772][ T9185] ? rw_verify_area+0x1c2/0x360 [ 2818.597598][ T9185] ? rcu_lock_release+0x26/0x30 [ 2818.602429][ T9185] do_splice_direct+0x279/0x3d0 [ 2818.607257][ T9185] ? splice_direct_to_actor+0xb40/0xb40 [ 2818.612780][ T9185] ? security_file_permission+0x148/0x350 [ 2818.618495][ T9185] do_sendfile+0x8a3/0x1110 [ 2818.622983][ T9185] ? compat_writev+0x390/0x390 [ 2818.627718][ T9185] ? __kasan_check_write+0x14/0x20 [ 2818.632804][ T9185] ? fput_many+0x47/0x1a0 [ 2818.637107][ T9185] ? check_preemption_disabled+0xb7/0x2a0 [ 2818.642824][ T9185] ? debug_smp_processor_id+0x1c/0x20 [ 2818.648175][ T9185] __x64_sys_sendfile64+0x1bc/0x220 [ 2818.654885][ T9185] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2818.660575][ T9185] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2818.665658][ T9185] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2818.673488][ T9185] ? trace_hardirqs_off_caller+0x58/0x80 [ 2818.679093][ T9185] ? do_syscall_64+0x1d/0x140 [ 2818.683753][ T9185] do_syscall_64+0xfe/0x140 [ 2818.688229][ T9185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2818.694099][ T9185] RIP: 0033:0x459829 [ 2818.697986][ T9185] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2818.717797][ T9185] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2818.726178][ T9185] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2818.734120][ T9185] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2818.742073][ T9185] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2818.751567][ T9185] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2818.759514][ T9185] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:15 executing program 0 (fault-call:3 fault-nth:9): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffffff1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) 19:33:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3f000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:15 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x29a860ad) 19:33:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80340000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 19:33:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x40000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2818.891880][ T9218] FAULT_INJECTION: forcing a failure. [ 2818.891880][ T9218] name failslab, interval 1, probability 0, space 0, times 0 [ 2818.951066][ T9218] CPU: 0 PID: 9218 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2818.959166][ T9218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2818.969219][ T9218] Call Trace: [ 2818.972510][ T9218] dump_stack+0x1d8/0x2f8 [ 2818.977263][ T9218] should_fail+0x608/0x860 [ 2818.981683][ T9218] ? setup_fault_attr+0x2b0/0x2b0 [ 2818.986703][ T9218] ? lock_acquire+0x158/0x250 [ 2818.992301][ T9218] __should_failslab+0x11a/0x160 19:33:16 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x29d9c748) [ 2818.997242][ T9218] should_failslab+0x9/0x20 [ 2819.001750][ T9218] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 2819.007463][ T9218] ? __kmalloc_node+0x3c/0x60 [ 2819.012141][ T9218] __kmalloc_node+0x3c/0x60 [ 2819.016643][ T9218] kvmalloc_node+0xcc/0x130 [ 2819.021137][ T9218] iov_iter_get_pages_alloc+0x87d/0xc50 [ 2819.026688][ T9218] default_file_splice_read+0x187/0x9e0 [ 2819.032229][ T9218] ? __put_page+0xa6/0x170 [ 2819.036648][ T9218] ? __ia32_sys_tee+0xb0/0xb0 [ 2819.041317][ T9218] ? __splice_from_pipe+0x829/0x8a0 [ 2819.046513][ T9218] ? memset+0x31/0x40 19:33:16 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x29faa253) [ 2819.050881][ T9218] ? fsnotify+0x14b9/0x1580 [ 2819.055385][ T9218] ? __fsnotify_parent+0x300/0x300 [ 2819.060489][ T9218] ? rw_verify_area+0x1c2/0x360 [ 2819.065319][ T9218] ? __ia32_sys_tee+0xb0/0xb0 [ 2819.065327][ T9218] splice_direct_to_actor+0x3ff/0xb40 [ 2819.065341][ T9218] ? do_splice_direct+0x3d0/0x3d0 [ 2819.065348][ T9218] ? pipe_to_sendpage+0x310/0x310 [ 2819.065357][ T9218] ? rw_verify_area+0x1c2/0x360 [ 2819.065365][ T9218] ? rcu_lock_release+0x26/0x30 [ 2819.065373][ T9218] do_splice_direct+0x279/0x3d0 19:33:16 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2a0d1f29) [ 2819.065383][ T9218] ? splice_direct_to_actor+0xb40/0xb40 [ 2819.065398][ T9218] ? security_file_permission+0x148/0x350 [ 2819.065408][ T9218] do_sendfile+0x8a3/0x1110 [ 2819.065428][ T9218] ? compat_writev+0x390/0x390 [ 2819.120633][ T9218] ? __kasan_check_write+0x14/0x20 [ 2819.125742][ T9218] ? fput_many+0x47/0x1a0 [ 2819.130060][ T9218] ? check_preemption_disabled+0xb7/0x2a0 [ 2819.135757][ T9218] ? debug_smp_processor_id+0x1c/0x20 [ 2819.135768][ T9218] __x64_sys_sendfile64+0x1bc/0x220 19:33:16 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2a2f9b88) [ 2819.135779][ T9218] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2819.135786][ T9218] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2819.135793][ T9218] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2819.135801][ T9218] ? trace_hardirqs_off_caller+0x58/0x80 [ 2819.135810][ T9218] ? do_syscall_64+0x1d/0x140 [ 2819.135822][ T9218] do_syscall_64+0xfe/0x140 [ 2819.135836][ T9218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2819.183983][ T9218] RIP: 0033:0x459829 [ 2819.187869][ T9218] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2819.207461][ T9218] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2819.207471][ T9218] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2819.207475][ T9218] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2819.207479][ T9218] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2819.207483][ T9218] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 19:33:16 executing program 0 (fault-call:3 fault-nth:10): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0xffffffffffffff3f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) 19:33:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x48000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80350000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2819.207488][ T9218] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:16 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2b2b4ffb) 19:33:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4c000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80360000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7d03000000000000]}, 0x48) [ 2819.322306][ T9255] FAULT_INJECTION: forcing a failure. [ 2819.322306][ T9255] name failslab, interval 1, probability 0, space 0, times 0 [ 2819.354057][ T9255] CPU: 0 PID: 9255 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2819.362007][ T9255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2819.372238][ T9255] Call Trace: [ 2819.375514][ T9255] dump_stack+0x1d8/0x2f8 [ 2819.379821][ T9255] should_fail+0x608/0x860 [ 2819.384222][ T9255] ? setup_fault_attr+0x2b0/0x2b0 [ 2819.389245][ T9255] ? lock_acquire+0x158/0x250 [ 2819.393903][ T9255] __should_failslab+0x11a/0x160 [ 2819.398834][ T9255] should_failslab+0x9/0x20 [ 2819.403315][ T9255] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 2819.409016][ T9255] ? __kmalloc_node+0x3c/0x60 [ 2819.413667][ T9255] __kmalloc_node+0x3c/0x60 [ 2819.418145][ T9255] kvmalloc_node+0xcc/0x130 [ 2819.422626][ T9255] iov_iter_get_pages_alloc+0x87d/0xc50 [ 2819.428146][ T9255] default_file_splice_read+0x187/0x9e0 [ 2819.433666][ T9255] ? __put_page+0xa6/0x170 [ 2819.438068][ T9255] ? __ia32_sys_tee+0xb0/0xb0 [ 2819.442718][ T9255] ? __splice_from_pipe+0x829/0x8a0 [ 2819.447902][ T9255] ? memset+0x31/0x40 [ 2819.452174][ T9255] ? fsnotify+0x14b9/0x1580 [ 2819.456658][ T9255] ? __fsnotify_parent+0x300/0x300 [ 2819.461758][ T9255] ? rw_verify_area+0x1c2/0x360 [ 2819.466584][ T9255] ? __ia32_sys_tee+0xb0/0xb0 [ 2819.471236][ T9255] splice_direct_to_actor+0x3ff/0xb40 [ 2819.476583][ T9255] ? do_splice_direct+0x3d0/0x3d0 [ 2819.481577][ T9255] ? pipe_to_sendpage+0x310/0x310 [ 2819.486574][ T9255] ? rw_verify_area+0x1c2/0x360 [ 2819.491398][ T9255] ? rcu_lock_release+0x26/0x30 [ 2819.496228][ T9255] do_splice_direct+0x279/0x3d0 [ 2819.501054][ T9255] ? splice_direct_to_actor+0xb40/0xb40 [ 2819.506577][ T9255] ? security_file_permission+0x148/0x350 [ 2819.512269][ T9255] do_sendfile+0x8a3/0x1110 [ 2819.516751][ T9255] ? compat_writev+0x390/0x390 [ 2819.521503][ T9255] ? __kasan_check_write+0x14/0x20 [ 2819.526590][ T9255] ? fput_many+0x47/0x1a0 [ 2819.530897][ T9255] ? check_preemption_disabled+0xb7/0x2a0 [ 2819.539734][ T9255] ? debug_smp_processor_id+0x1c/0x20 [ 2819.545189][ T9255] __x64_sys_sendfile64+0x1bc/0x220 [ 2819.550735][ T9255] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2819.556432][ T9255] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2819.561612][ T9255] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2819.567316][ T9255] ? trace_hardirqs_off_caller+0x58/0x80 [ 2819.572922][ T9255] ? do_syscall_64+0x1d/0x140 [ 2819.577574][ T9255] do_syscall_64+0xfe/0x140 [ 2819.582066][ T9255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2819.587952][ T9255] RIP: 0033:0x459829 [ 2819.591821][ T9255] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2819.611398][ T9255] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 19:33:16 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2b300e41) 19:33:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80370000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2819.619798][ T9255] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2819.627757][ T9255] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2819.635702][ T9255] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2819.643647][ T9255] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2819.651936][ T9255] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:16 executing program 0 (fault-call:3 fault-nth:11): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x68000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9c01000000000000]}, 0x48) 19:33:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x3], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80380000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa002000000000000]}, 0x48) 19:33:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6c000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:17 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2bbe5141) 19:33:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc200000000000000]}, 0x48) 19:33:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80390000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x4], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2819.875486][ T9285] FAULT_INJECTION: forcing a failure. [ 2819.875486][ T9285] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2819.957077][ T9285] CPU: 1 PID: 9285 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2819.964997][ T9285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2819.975046][ T9285] Call Trace: [ 2819.978341][ T9285] dump_stack+0x1d8/0x2f8 [ 2819.982676][ T9285] should_fail+0x608/0x860 [ 2819.987101][ T9285] ? setup_fault_attr+0x2b0/0x2b0 [ 2819.992127][ T9285] should_fail_alloc_page+0x55/0x60 [ 2819.997415][ T9285] prepare_alloc_pages+0x283/0x470 [ 2820.002530][ T9285] __alloc_pages_nodemask+0x11c/0x790 [ 2820.007903][ T9285] ? do_splice_direct+0x279/0x3d0 [ 2820.012927][ T9285] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2820.018473][ T9285] ? kvmalloc_node+0xcc/0x130 [ 2820.023148][ T9285] ? default_file_splice_read+0x187/0x9e0 [ 2820.028869][ T9285] ? do_splice_direct+0x279/0x3d0 [ 2820.033890][ T9285] ? trace_lock_release+0x135/0x1a0 [ 2820.039092][ T9285] alloc_pages_current+0x2db/0x500 [ 2820.044203][ T9285] push_pipe+0x3b1/0x750 [ 2820.049944][ T9285] __pipe_get_pages+0xd2/0x420 [ 2820.054717][ T9285] ? push_pipe+0x750/0x750 [ 2820.059128][ T9285] ? kasan_kmalloc+0x9/0x10 [ 2820.063630][ T9285] ? __kmalloc_node+0x4d/0x60 [ 2820.068310][ T9285] iov_iter_get_pages_alloc+0x89b/0xc50 [ 2820.073861][ T9285] default_file_splice_read+0x187/0x9e0 [ 2820.079406][ T9285] ? __put_page+0xa6/0x170 [ 2820.083826][ T9285] ? __ia32_sys_tee+0xb0/0xb0 [ 2820.088499][ T9285] ? __splice_from_pipe+0x829/0x8a0 [ 2820.093698][ T9285] ? memset+0x31/0x40 [ 2820.097677][ T9285] ? fsnotify+0x14b9/0x1580 [ 2820.102178][ T9285] ? __fsnotify_parent+0x300/0x300 19:33:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x5], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2820.107293][ T9285] ? rw_verify_area+0x1c2/0x360 [ 2820.112136][ T9285] ? __ia32_sys_tee+0xb0/0xb0 [ 2820.116805][ T9285] splice_direct_to_actor+0x3ff/0xb40 [ 2820.122183][ T9285] ? do_splice_direct+0x3d0/0x3d0 [ 2820.127201][ T9285] ? pipe_to_sendpage+0x310/0x310 [ 2820.132215][ T9285] ? rw_verify_area+0x1c2/0x360 [ 2820.132225][ T9285] ? rcu_lock_release+0x26/0x30 [ 2820.132237][ T9285] do_splice_direct+0x279/0x3d0 [ 2820.141892][ T9285] ? splice_direct_to_actor+0xb40/0xb40 [ 2820.153750][ T9285] ? security_file_permission+0x148/0x350 [ 2820.159464][ T9285] do_sendfile+0x8a3/0x1110 [ 2820.163953][ T9285] ? compat_writev+0x390/0x390 [ 2820.163964][ T9285] ? __kasan_check_write+0x14/0x20 [ 2820.163971][ T9285] ? fput_many+0x47/0x1a0 [ 2820.163983][ T9285] ? check_preemption_disabled+0xb7/0x2a0 [ 2820.183838][ T9285] ? debug_smp_processor_id+0x1c/0x20 [ 2820.189213][ T9285] __x64_sys_sendfile64+0x1bc/0x220 [ 2820.194412][ T9285] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2820.200120][ T9285] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2820.205270][ T9285] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2820.210957][ T9285] ? trace_hardirqs_off_caller+0x58/0x80 [ 2820.216615][ T9285] ? do_syscall_64+0x1d/0x140 [ 2820.221269][ T9285] do_syscall_64+0xfe/0x140 [ 2820.225746][ T9285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2820.231649][ T9285] RIP: 0033:0x459829 [ 2820.236211][ T9285] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:33:17 executing program 0 (fault-call:3 fault-nth:12): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x74000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x6], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:17 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2c311aa7) 19:33:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xcc03000000000000]}, 0x48) 19:33:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x803a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2820.255792][ T9285] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2820.264608][ T9285] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2820.272553][ T9285] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2820.280508][ T9285] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2820.288456][ T9285] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2820.296417][ T9285] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xcf01000000000000]}, 0x48) 19:33:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x803b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x74010000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x7], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:17 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2c6d92f3) [ 2820.437686][ T9333] FAULT_INJECTION: forcing a failure. [ 2820.437686][ T9333] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:33:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x803c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2820.501856][ T9333] CPU: 1 PID: 9333 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2820.509862][ T9333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2820.519915][ T9333] Call Trace: [ 2820.523206][ T9333] dump_stack+0x1d8/0x2f8 [ 2820.527538][ T9333] should_fail+0x608/0x860 [ 2820.531951][ T9333] ? setup_fault_attr+0x2b0/0x2b0 [ 2820.536987][ T9333] should_fail_alloc_page+0x55/0x60 [ 2820.542296][ T9333] prepare_alloc_pages+0x283/0x470 [ 2820.547407][ T9333] __alloc_pages_nodemask+0x11c/0x790 [ 2820.552765][ T9333] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2820.558291][ T9333] ? kvmalloc_node+0xcc/0x130 [ 2820.564201][ T9333] ? default_file_splice_read+0x187/0x9e0 [ 2820.569980][ T9333] ? do_splice_direct+0x279/0x3d0 [ 2820.574976][ T9333] ? trace_lock_release+0x135/0x1a0 [ 2820.580149][ T9333] alloc_pages_current+0x2db/0x500 [ 2820.585237][ T9333] push_pipe+0x3b1/0x750 [ 2820.589453][ T9333] __pipe_get_pages+0xd2/0x420 [ 2820.594193][ T9333] ? push_pipe+0x750/0x750 [ 2820.598582][ T9333] ? kasan_kmalloc+0x9/0x10 [ 2820.603061][ T9333] ? __kmalloc_node+0x4d/0x60 [ 2820.607712][ T9333] iov_iter_get_pages_alloc+0x89b/0xc50 [ 2820.613231][ T9333] default_file_splice_read+0x187/0x9e0 [ 2820.618750][ T9333] ? __put_page+0xa6/0x170 [ 2820.623147][ T9333] ? __ia32_sys_tee+0xb0/0xb0 [ 2820.627793][ T9333] ? __splice_from_pipe+0x829/0x8a0 [ 2820.632966][ T9333] ? memset+0x31/0x40 [ 2820.636922][ T9333] ? fsnotify+0x14b9/0x1580 [ 2820.641402][ T9333] ? __fsnotify_parent+0x300/0x300 [ 2820.646492][ T9333] ? rw_verify_area+0x1c2/0x360 [ 2820.651313][ T9333] ? __ia32_sys_tee+0xb0/0xb0 [ 2820.655960][ T9333] splice_direct_to_actor+0x3ff/0xb40 [ 2820.662816][ T9333] ? do_splice_direct+0x3d0/0x3d0 [ 2820.667811][ T9333] ? pipe_to_sendpage+0x310/0x310 [ 2820.672816][ T9333] ? rw_verify_area+0x1c2/0x360 [ 2820.677659][ T9333] ? rcu_lock_release+0x26/0x30 [ 2820.682486][ T9333] do_splice_direct+0x279/0x3d0 [ 2820.687311][ T9333] ? splice_direct_to_actor+0xb40/0xb40 [ 2820.692928][ T9333] ? security_file_permission+0x148/0x350 [ 2820.698625][ T9333] do_sendfile+0x8a3/0x1110 [ 2820.703106][ T9333] ? compat_writev+0x390/0x390 [ 2820.707842][ T9333] ? __kasan_check_write+0x14/0x20 [ 2820.712925][ T9333] ? fput_many+0x47/0x1a0 [ 2820.717224][ T9333] ? check_preemption_disabled+0xb7/0x2a0 [ 2820.722917][ T9333] ? debug_smp_processor_id+0x1c/0x20 [ 2820.728263][ T9333] __x64_sys_sendfile64+0x1bc/0x220 [ 2820.733433][ T9333] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2820.739124][ T9333] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2820.744215][ T9333] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2820.749906][ T9333] ? trace_hardirqs_off_caller+0x58/0x80 [ 2820.755778][ T9333] ? do_syscall_64+0x1d/0x140 [ 2820.761877][ T9333] do_syscall_64+0xfe/0x140 [ 2820.766358][ T9333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2820.772223][ T9333] RIP: 0033:0x459829 [ 2820.776094][ T9333] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2820.795683][ T9333] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2820.804068][ T9333] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2820.812023][ T9333] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2820.819968][ T9333] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2820.827912][ T9333] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2820.835856][ T9333] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:18 executing program 0 (fault-call:3 fault-nth:13): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x8], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7a000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd801000000000000]}, 0x48) 19:33:18 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2c7e3147) 19:33:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x803d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf402000000000000]}, 0x48) 19:33:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x9], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7d030000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x803e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:18 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2c7eb664) [ 2820.995435][ T9400] FAULT_INJECTION: forcing a failure. [ 2820.995435][ T9400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2821.052411][ T9400] CPU: 1 PID: 9400 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2821.061651][ T9400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2821.071711][ T9400] Call Trace: [ 2821.075006][ T9400] dump_stack+0x1d8/0x2f8 [ 2821.079331][ T9400] should_fail+0x608/0x860 [ 2821.083745][ T9400] ? setup_fault_attr+0x2b0/0x2b0 [ 2821.088771][ T9400] should_fail_alloc_page+0x55/0x60 [ 2821.093963][ T9400] prepare_alloc_pages+0x283/0x470 19:33:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xa], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2821.099071][ T9400] __alloc_pages_nodemask+0x11c/0x790 [ 2821.104440][ T9400] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2821.109978][ T9400] ? kvmalloc_node+0xcc/0x130 [ 2821.114649][ T9400] ? default_file_splice_read+0x187/0x9e0 [ 2821.120364][ T9400] ? do_splice_direct+0x279/0x3d0 [ 2821.125387][ T9400] ? trace_lock_release+0x135/0x1a0 [ 2821.130594][ T9400] alloc_pages_current+0x2db/0x500 [ 2821.135709][ T9400] push_pipe+0x3b1/0x750 [ 2821.139954][ T9400] __pipe_get_pages+0xd2/0x420 [ 2821.144717][ T9400] ? push_pipe+0x750/0x750 [ 2821.149131][ T9400] ? kasan_kmalloc+0x9/0x10 [ 2821.153633][ T9400] ? __kmalloc_node+0x4d/0x60 [ 2821.158297][ T9400] iov_iter_get_pages_alloc+0x89b/0xc50 [ 2821.165201][ T9400] default_file_splice_read+0x187/0x9e0 [ 2821.170727][ T9400] ? __put_page+0xa6/0x170 [ 2821.175121][ T9400] ? __ia32_sys_tee+0xb0/0xb0 [ 2821.179770][ T9400] ? __splice_from_pipe+0x829/0x8a0 [ 2821.184955][ T9400] ? memset+0x31/0x40 [ 2821.188911][ T9400] ? fsnotify+0x14b9/0x1580 [ 2821.193404][ T9400] ? __fsnotify_parent+0x300/0x300 [ 2821.198506][ T9400] ? rw_verify_area+0x1c2/0x360 [ 2821.203336][ T9400] ? __ia32_sys_tee+0xb0/0xb0 [ 2821.207986][ T9400] splice_direct_to_actor+0x3ff/0xb40 [ 2821.213336][ T9400] ? do_splice_direct+0x3d0/0x3d0 [ 2821.218329][ T9400] ? pipe_to_sendpage+0x310/0x310 [ 2821.223325][ T9400] ? rw_verify_area+0x1c2/0x360 [ 2821.228151][ T9400] ? rcu_lock_release+0x26/0x30 [ 2821.232976][ T9400] do_splice_direct+0x279/0x3d0 [ 2821.237801][ T9400] ? splice_direct_to_actor+0xb40/0xb40 [ 2821.243337][ T9400] ? security_file_permission+0x148/0x350 [ 2821.249030][ T9400] do_sendfile+0x8a3/0x1110 [ 2821.253513][ T9400] ? compat_writev+0x390/0x390 [ 2821.258247][ T9400] ? __kasan_check_write+0x14/0x20 [ 2821.264830][ T9400] ? fput_many+0x47/0x1a0 [ 2821.269149][ T9400] ? check_preemption_disabled+0xb7/0x2a0 [ 2821.274839][ T9400] ? debug_smp_processor_id+0x1c/0x20 [ 2821.280181][ T9400] __x64_sys_sendfile64+0x1bc/0x220 [ 2821.285351][ T9400] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2821.291042][ T9400] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2821.296128][ T9400] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2821.301820][ T9400] ? trace_hardirqs_off_caller+0x58/0x80 [ 2821.307427][ T9400] ? do_syscall_64+0x1d/0x140 [ 2821.312081][ T9400] do_syscall_64+0xfe/0x140 [ 2821.316560][ T9400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2821.322425][ T9400] RIP: 0033:0x459829 [ 2821.326296][ T9400] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2821.345870][ T9400] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2821.354249][ T9400] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2821.363688][ T9400] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2821.371632][ T9400] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2821.379584][ T9400] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2821.387540][ T9400] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:18 executing program 0 (fault-call:3 fault-nth:14): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:18 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2ca637c2) 19:33:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xb], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf403000000000000]}, 0x48) 19:33:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x9c010000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x803f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80400000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xc], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc03000000000000]}, 0x48) 19:33:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa0020000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80410000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2821.640709][ T9443] FAULT_INJECTION: forcing a failure. [ 2821.640709][ T9443] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:33:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xd], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) [ 2821.691311][ T9443] CPU: 1 PID: 9443 Comm: syz-executor.0 Not tainted 5.3.0-rc2+ #57 [ 2821.699222][ T9443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2821.699226][ T9443] Call Trace: [ 2821.699244][ T9443] dump_stack+0x1d8/0x2f8 [ 2821.699258][ T9443] should_fail+0x608/0x860 [ 2821.699270][ T9443] ? setup_fault_attr+0x2b0/0x2b0 [ 2821.699287][ T9443] should_fail_alloc_page+0x55/0x60 [ 2821.699297][ T9443] prepare_alloc_pages+0x283/0x470 [ 2821.699309][ T9443] __alloc_pages_nodemask+0x11c/0x790 [ 2821.699323][ T9443] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2821.699333][ T9443] ? kvmalloc_node+0xcc/0x130 [ 2821.699341][ T9443] ? default_file_splice_read+0x187/0x9e0 [ 2821.699354][ T9443] ? do_splice_direct+0x279/0x3d0 [ 2821.736675][ T9443] ? trace_lock_release+0x135/0x1a0 [ 2821.736693][ T9443] alloc_pages_current+0x2db/0x500 [ 2821.752234][ T9443] push_pipe+0x3b1/0x750 [ 2821.752247][ T9443] __pipe_get_pages+0xd2/0x420 [ 2821.752256][ T9443] ? push_pipe+0x750/0x750 [ 2821.752264][ T9443] ? kasan_kmalloc+0x9/0x10 [ 2821.752278][ T9443] ? __kmalloc_node+0x4d/0x60 [ 2821.764261][ T9443] iov_iter_get_pages_alloc+0x89b/0xc50 [ 2821.774525][ T9443] default_file_splice_read+0x187/0x9e0 [ 2821.774540][ T9443] ? __put_page+0xa6/0x170 [ 2821.774550][ T9443] ? __ia32_sys_tee+0xb0/0xb0 [ 2821.774561][ T9443] ? __splice_from_pipe+0x829/0x8a0 [ 2821.792406][ T9443] ? memset+0x31/0x40 [ 2821.792417][ T9443] ? fsnotify+0x14b9/0x1580 [ 2821.792433][ T9443] ? __fsnotify_parent+0x300/0x300 [ 2821.792450][ T9443] ? rw_verify_area+0x1c2/0x360 [ 2821.842087][ T9443] ? __ia32_sys_tee+0xb0/0xb0 [ 2821.846848][ T9443] splice_direct_to_actor+0x3ff/0xb40 [ 2821.852197][ T9443] ? do_splice_direct+0x3d0/0x3d0 [ 2821.857196][ T9443] ? pipe_to_sendpage+0x310/0x310 [ 2821.863564][ T9443] ? rw_verify_area+0x1c2/0x360 [ 2821.868389][ T9443] ? rcu_lock_release+0x26/0x30 [ 2821.873212][ T9443] do_splice_direct+0x279/0x3d0 [ 2821.878038][ T9443] ? splice_direct_to_actor+0xb40/0xb40 [ 2821.883562][ T9443] ? security_file_permission+0x148/0x350 [ 2821.889254][ T9443] do_sendfile+0x8a3/0x1110 [ 2821.893737][ T9443] ? compat_writev+0x390/0x390 [ 2821.898475][ T9443] ? __kasan_check_write+0x14/0x20 [ 2821.903560][ T9443] ? fput_many+0x47/0x1a0 [ 2821.907859][ T9443] ? check_preemption_disabled+0xb7/0x2a0 [ 2821.913548][ T9443] ? debug_smp_processor_id+0x1c/0x20 [ 2821.918894][ T9443] __x64_sys_sendfile64+0x1bc/0x220 [ 2821.924064][ T9443] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2821.929753][ T9443] ? __ia32_sys_sendfile+0xb0/0xb0 [ 2821.934850][ T9443] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 2821.940539][ T9443] ? trace_hardirqs_off_caller+0x58/0x80 [ 2821.946141][ T9443] ? do_syscall_64+0x1d/0x140 [ 2821.950791][ T9443] do_syscall_64+0xfe/0x140 [ 2821.955274][ T9443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2821.961136][ T9443] RIP: 0033:0x459829 [ 2821.966521][ T9443] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2821.986119][ T9443] RSP: 002b:00007f3d93635c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2821.994970][ T9443] RAX: ffffffffffffffda RBX: 00007f3d93635c90 RCX: 0000000000459829 [ 2822.002914][ T9443] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2822.010868][ T9443] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2822.018811][ T9443] R10: 000000000000320f R11: 0000000000000246 R12: 00007f3d936366d4 [ 2822.026754][ T9443] R13: 00000000004c6ff7 R14: 00000000004dc558 R15: 0000000000000006 19:33:19 executing program 0 (fault-call:3 fault-nth:15): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:19 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2cd63537) 19:33:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xc2000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xf], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 19:33:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80420000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 19:33:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x10], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xd8010000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80430000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2d5f46aa) 19:33:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80440000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe5030000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 19:33:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x11], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80450000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xf4020000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 19:33:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80460000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x12], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:19 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2d703f63) 19:33:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80470000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xfe030000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0xf2f) 19:33:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 19:33:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x13], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xff000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0x80af1100c9ffff}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2d8171f1) 19:33:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0000000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 19:33:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x14], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:19 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x7ffff000) 19:33:19 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2dc28221) 19:33:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0010000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 19:33:20 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2de40ec1) 19:33:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x17], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0xffffffffffffffff) 19:33:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x20000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 19:33:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0020000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2ee5ade7) 19:33:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fgetxattr(r0, &(0x7f0000000000)=@random={'security.', '\b\'\x00'}, &(0x7f0000000a40)=""/56, 0x38) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff}) write$binfmt_aout(r1, &(0x7f0000000080)={{0x10b, 0x7cb, 0x5, 0x59, 0xd2, 0x2, 0x29b, 0x9}, "5f9a630b5595ea1e9f69ddffe64eba4d1ee9a7765dbdd84a669439acaad661e9c82bfa389cc635215560331b12891f3c716953662e1683a1c08c7e6fad2f7edd82d1452888219ee9d28014d867c6d16c529bd24e6c62268a6d2fa4ef496777c2cf678c121806f94ba67f45dd4ee4af4834", [[], [], [], [], [], [], [], [], []]}, 0x991) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000ac0)) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000a80)) 19:33:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 19:33:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x18], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0030000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x100000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2f08d2c4) 19:33:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x200000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x19], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x48) 19:33:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0040000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1a], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 19:33:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r1, 0x1, 0x42, &(0x7f0000000000)={0x0, 0x7530}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x2, 0x7, 0x0, 0x5, 0x6, [{0x2, 0x7, 0x401, 0x0, 0x0, 0x800}, {0xfffffffffffffff9, 0x2c61, 0x6, 0x0, 0x0, 0x180}, {0x80, 0x101, 0x1ff, 0x0, 0x0, 0x2004}, {0x4, 0x9, 0x1000, 0x0, 0x0, 0x402}, {0x3, 0x5, 0x2, 0x0, 0x0, 0x1001}, {0x101, 0x4, 0x2, 0x0, 0x0, 0x100}]}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) r4 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x5, 0x4e21, 0x4, 0xa, 0x80, 0xa0, 0x3f, r3, r4}, {0x7, 0x3ca, 0x100, 0x7fffffff, 0xfffffffffffeffff, 0xc42, 0x1, 0x84}, {0x0, 0x800, 0x6, 0x3ff}, 0x9, 0x6e6bb1, 0x0, 0x1, 0x2}, {{@in=@loopback, 0x4d3, 0xff}, 0x2, @in=@rand_addr=0x1, 0x3504, 0x1, 0x2, 0x73, 0x3, 0x2, 0xff}}, 0xe8) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r2, 0x0, 0x320f) 19:33:20 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2f719fc5) 19:33:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1b], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0050000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x300000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2f76725c) 19:33:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x400000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x48) 19:33:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0060000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1c], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) sendfile(r1, r0, 0x0, 0x320b) 19:33:20 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2f85c37d) 19:33:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x500000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0070000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x48) 19:33:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x501000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x48) 19:33:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1d], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:20 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x2) sendfile(r0, r1, 0x0, 0x320f) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x46, "15ff668f5a96ac292b296d99d8f5e87bfce0764f65efebd54b1421db586b35d0c8655bef478899c522b99178f8f4227d09a579f412ffbde444e6fc336e95207e654e5a647924"}, &(0x7f0000000000)=0x4e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e22, 0x1, @loopback, 0x9}}, 0x9, 0x1, 0x2, 0x3, 0x9c}, &(0x7f00000001c0)=0x98) 19:33:20 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2f9fd685) 19:33:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0080000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0090000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x48) 19:33:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x21], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x600000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x2fa263a0) 19:33:21 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) fstatfs(r1, &(0x7f0000000080)=""/131) sendfile(r0, r1, 0x0, 0x320f) 19:33:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x22], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 19:33:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x700000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa00a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x303708c7) 19:33:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x23], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:21 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/softnet_stat\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x48) 19:33:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}, 0x48) 19:33:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x800000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x303dff1d) 19:33:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa00b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x24], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25]}, 0x48) 19:33:21 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x5df, @local, 0x2}, @in6={0xa, 0x4e22, 0x5, @local, 0x988}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x48) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000000)={0x77359400}, 0x10) prctl$PR_SET_THP_DISABLE(0x29, 0x200000) sendfile(r0, r2, 0x0, 0x10320f) 19:33:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x900000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa00c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x305f6320) 19:33:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x25], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27]}, 0x48) 19:33:21 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x5, 0x1, 0xfffffffffffff801, 0x2, 0x9}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r2, 0x0, 0x320f) 19:33:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x26], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa00d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x30bae11d) 19:33:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 19:33:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa00e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x27], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xb00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) 19:33:21 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) acct(0x0) sendfile(r1, r2, 0x0, 0x320f) 19:33:21 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x30d5ee91) 19:33:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa00f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x28], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 19:33:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0100000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xc00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x5, 0x4]) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x29], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:22 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x327694fd) 19:33:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) 19:33:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xd00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x20002) sendfile(r1, r2, 0x0, 0x320f) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_sctp(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0x76, &(0x7f0000000200)={0x1, 0x0, 0x1000000000, 0x2, 0x0, 0x0, 0x8}, &(0x7f0000000240)=0x20) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000180)={0xa0, 0x0, 0x1, {{0x0, 0x0, 0x7f, 0xfffffffffffffff9, 0x6, 0x96, {0x6, 0x7fff, 0x6, 0xfffffffffffffffc, 0x3f, 0x1000, 0xfffffffffffffff9, 0x3, 0x700000000000000, 0xff, 0x81, r3, r5, 0x728, 0x10000}}, {0x0, 0x1d}}}, 0xa0) 19:33:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0110000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x32dff069) 19:33:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) 19:33:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x44], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0120000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 19:33:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xfc], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:22 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x7, &(0x7f0000000000)='\\nodev\x00', 0xffffffffffffffff}, 0x30) gettid() r2 = fcntl$getown(r1, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000140)='sm\x06\x00\x00\x00\xe3\b\x00\x00\x00\x00\x00\x00\x00\x9c\xe32-\xc5\xbc\x06F\xb1\x84\xd3\x00#\xc2\xd1\x13\xfc\xfcH\x1d\x81B\xbf\n\xaa\xc4\xd2\xba\xccs\xd0\xd7\xfc*\x0f\xcby\xect\xc3\xcdki34\xcb\xf3\xce\x82\x85\xa9\xc2o\xf0}\xed\x02>\xe27\t\xf0\xb2J\xd5\x9d\xe8\tl$\xac\xc5\xfa|\xd0\xfc\xbeOE\xe8\x14\x81\x1f\x11\x04]\xcd6\t\x9b\xf6M\x1a\'Qr0F\xfd\x80b\xfcbz\x1b\v\xb4\x00L\xc9\x12\x00\xcd\x8dx#\xa2\x1e\a\":_\x86\\\xbd\xf4;s#\xb1\xa3\xf7\xc3\xb48\x97\xbe&\xa1\xff\x8b!m;\xed\n\xe0\xd2CP\x10\xbd\xfbY\x1fo/1\xc6\xd3L\x95l\xd3tP\xc6\x1f\x8b\xe9\xa4\xa1\x10\x05v\xd78\xac!') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r3, 0x0, 0x320f) 19:33:22 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x330b2d6b) 19:33:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0140000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x300], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2]}, 0x48) 19:33:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0150000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1100000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x500], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:22 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) sendfile(r0, r2, 0x0, 0x320f) 19:33:22 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x331309a1) 19:33:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0160000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x1200000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x105]}, 0x48) 19:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x600], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2000000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 0: munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) fcntl$setsig(r0, 0xa, 0x15) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/196, 0xc4}, {&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000180)=""/215, 0xd7}, {&(0x7f0000000380)=""/134, 0x86}], 0x4, 0x33) sendfile(r0, r1, 0x0, 0x320f) 19:33:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0170000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x340dd6d6) 19:33:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19c]}, 0x48) 19:33:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2500000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x700], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1cf]}, 0x48) 19:33:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) write$FUSE_DIRENT(r2, &(0x7f0000000080)={0x48, 0xfffffffffffffffe, 0x3, [{0x5, 0xffffffff, 0x0, 0x5}, {0x1, 0x200, 0x6, 0x80000001, 'smaps\x00'}]}, 0x48) dup(r0) sendfile(r1, r2, 0x0, 0x320f) 19:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0180000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x900], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:23 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x34705c63) 19:33:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2700000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0190000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d8]}, 0x48) 19:33:23 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000002c0)={0xda, 0x5, 0xf7, &(0x7f00000001c0)="08214b991fd6ef0e9b7826adba4e69c3cb69a373119d76a82f5831e271341bc454445f0d66cbf1f10f55f79c7ae2cd32c8d31b624878b55f09c20c69a40d0aa1c343a2989fead2bd6de80291db36485adf6c65005b8d587e9a0a468bdb4cf64afd436ee723f01a6a6fd5940ff1097655e4489ed06f156c01152a60ff6f839d31967c2246e557a12015535a0a19c6ff129f246267ca950c25bfec58f9a14736f5d6970894b0789927a8ae2b691c748ece60bde2a83676abc96c847612e564c1d36c30293ff4211db8f53aa4b9c669e3e21d6742ea868d8dc1b77cf27f1c6102d536dcabc72dd4ccc75d41e78d1981dbafbdcd73961350e9"}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc02000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r3, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffffa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xd5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20004010}, 0x10) sendfile(r1, r2, 0x0, 0x320f) 19:33:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xa00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:23 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x34b1f24c) 19:33:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x2c02000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22c]}, 0x48) 19:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa01a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xb00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r2, 0x0, 0x320f) linkat(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1400) 19:33:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x3f00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a0]}, 0x48) 19:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa01b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xc00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:23 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x35311f72) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f4]}, 0x48) 19:33:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa01c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x88000, 0x9a) sendfile(r0, r1, 0x0, 0x320f) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 19:33:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xd00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa01d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4800000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x353a27f2) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37d]}, 0x48) 19:33:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x4c00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa01e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xf00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc]}, 0x48) 19:33:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r0, 0x0, 0x81) ioctl$VT_DISALLOCATE(r0, 0x5608) 19:33:23 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x353d9014) 19:33:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f4]}, 0x48) 19:33:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa01f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6800000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:23 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x35abec3e) 19:33:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000080)={0x80, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}}, {{0x2, 0x4e21, @broadcast}}}, 0x108) sendfile(r0, r1, 0x0, 0x320f) 19:33:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1100], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0200000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fc]}, 0x48) 19:33:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x6c00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x362e48aa) 19:33:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1200], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0210000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') futex(&(0x7f0000000000), 0x8f, 0x2, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0)=0x2, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 19:33:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7400000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3675b3af) 19:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x501]}, 0x48) 19:33:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0220000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1300], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:24 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2009}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r3, 0x21, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'ip6tnl0\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x343884f844692c69) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r2, 0x0, 0x320f) 19:33:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7401000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 19:33:24 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3687dcd3) 19:33:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0230000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7a00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 19:33:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1400], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0240000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x368d273c) 19:33:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x7d03000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfe, 0x80000000}, 0xc) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000180)={'batadv0\x00', {0x2, 0x4e21, @broadcast}}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x1000, 0x6, 0x4, 0xbe9, 0x20, 0xb1, 0x20, {0x0, @in6={{0xa, 0x4e21, 0x2, @rand_addr="bbfa47271462076259be1e52d801196d", 0x100000001}}, 0x8, 0x8, 0x6, 0xde9, 0x2e2a4000}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000002c0)={r2, 0x3}, &(0x7f0000000300)=0x10) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000400)={r1, r1, 0x2, 0xbe, &(0x7f0000000340)="571f07bf7ea23a767b3a4ba69dd15f4b7499eb6da8af785510706ebe5668c239a1a453f2479b55c18ed662e08e5b132add5e37d73a3ecd5a8a416cacbd91dc9df8502fea2267e2bbf4eeddce089683dc03e1cae28e4c6d4be9226c215d71a151b3e19fe27c71ad78b93d8e402a033d57b2137e34c4a184d2aaede0a3d13bcc034f642d247a786cdc651c9d56ffe67f863b4368d76d7dc6e36d91de1ec580a75cef7c0d6b1993004b21f3abd2ef47c5a17fd387358bf82029344895811076", 0xb47, 0xb, 0x7ae, 0x10000, 0x935b, 0x1, 0x6, 'syz0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x6, &(0x7f00000000c0)='smaps\x00'}, 0x30) iopl(0x8d) ioctl$sock_proto_private(r0, 0x89e8, &(0x7f00000004c0)="26e459cbfa0c0e22de25a14685fdd2b3ae6ad9cffc0d30f07fecb74048c8f220b1f9db7a8fcc9625bb5e40d78cb880e48ce7f5f84a5fd552b121043ad6c545ec9bbf67cbf4b3ade28f90358200f26411cc8715e86f1442f0aca65cd1202ab74124b9069d1d4a31a467bc9cee829a3fdd4cdcc1c30bd3f55279f64dd9146d61d5c33a8cb417e05657fdf0728f4d3098e0199b578ac9c7939f590a") r4 = syz_open_procfs(r3, &(0x7f0000000080)='oom_adj\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r4, 0x0, 0x320f) 19:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x48) 19:33:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1700], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0250000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='smaps\x00', &(0x7f0000000080)='smaps\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000000c0)={0xffffffff, 0xcb, "08a235e237a94c87fbb84ae4487429d0130d8ac5b208de7f48a2c67ecb76d37e4e0de2000c5680f254c86d3212dd53133db48a631489bfe38d0de84ead18f8df69981cfc8c01e63f2a551cf5cbadea4f356b00d9585100fee7a8bfcd5c20f63e5a19101afb6b9cbe5b3f33ccb265066d6e9ea2011509b21b2ae0e7ab9bccbfbd549e7dcad2af6290901bc59283530b951402447db3dcae61c78c1f91ccaba1682747cf24a71da8eeb67d6627e0a877bdfb168c9953f10bc6faa9fa772c0badd8030217ed8014b6526f4a13"}) sendfile(r1, r2, 0x0, 0x320f) 19:33:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x8000000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 19:33:24 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x36ada73e) 19:33:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1800], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0260000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x9c01000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x48) 19:33:24 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0270000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x37063b83) 19:33:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1900], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x48) 19:33:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xa002000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipx\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@local, @in6=@local}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) 19:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0280000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1a00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xc200000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x48) 19:33:25 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3735d62c) 19:33:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r2, 0x0, 0x320f) 19:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0290000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x48) 19:33:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1b00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xd801000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x375b09a4) 19:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa02a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x10, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r2, 0x0, 0x320f) 19:33:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x48) 19:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa02b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xe503000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1c00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}, 0x48) 19:33:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xa8, "741cd5b1a9f3a32ad8df36691e67297069ddac0f6713e2bda1ebb5083a4fb8c32ebd8fe90ce6cb738ba5216c1842a475fe8e6434676b8d783933aeb4e70a32d2a11c8dfc93fa5b9cb7dcdb1cb81f19d93a50a2c697aa79911747d3609aadd252b8689f4d2e4c38dc049054933a0d21add9ad9180869b0d9734682671fe851f58afdc257b6965f3a6bff851bf51e0a25055886e481121589464a04548f831f0d3cb35693079a7a18b"}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r3, 0xfffffffffffffffd}, &(0x7f0000000280)=0x8) bind$llc(r0, &(0x7f0000000100)={0x1a, 0x315, 0x9279, 0x800, 0x3a, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) prctl$PR_SET_THP_DISABLE(0x29, 0x1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) syz_open_procfs(r4, &(0x7f00000000c0)='fdinfo/4\x00') sendfile(r1, r2, 0x0, 0x320f) 19:33:25 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3772d8af) 19:33:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 19:33:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xf402000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa02c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1d00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r2, 0x0, 0x320f) 19:33:25 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x37e52508) 19:33:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2500]}, 0x48) 19:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa02d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1f00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xfe03000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700]}, 0x48) 19:33:25 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x38f70520) 19:33:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa02e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0xfffffffeffffffff, 0x6, 0x100000000, 0x2}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r2, 0x0, 0x320f) 19:33:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xff00000000000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c02]}, 0x48) 19:33:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1fff], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa02f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x308, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x156861c691ef15dc) 19:33:26 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3975eb16) 19:33:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0xffffffff00000000, 0x33, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 19:33:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0300000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2100], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:26 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3ad30041) 19:33:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 19:33:26 executing program 0: lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0xffff, 0x8, &(0x7f00000008c0)=[{&(0x7f0000000200)="d9e0d635539eb90064b1ce62197ca45906fb01099e0498b0aa7b263da3f25d82b6df66813c256c48b9c5f23883430827232ec3b3b57801f0db633d221a2a0ab35ff61f4e5f4efba912dd91f97b3e915287653be34deb6e97c15a421b8394e42fa1520f6069fcc06dee20786acfd30077df066fe1e3ada98a071ea461135bd3e83f860ab1db14a9bdbda8cf505e2fe686886806fdaafbf0b77e2c268000a267d9b5c90718e9bea216d90c904ba4e209b528579d790595ec7d7cd46ac4e8702a962cd673e5791319d33a20b7cf9995a547db7b28899e616b25d100b58061444ffc46572a41c87c9a45688969e5a48c739a", 0xf0, 0x7}, {&(0x7f0000000300)="055fc552da83149ea5c26192650b01b8d5b06345a721ed31c38d91bcb2510bbdd3da9f027128b1261dea1d42d46938b26a0362e3c68bd23f965ebb6fba1577328df6937384b809df16be5796ea24b3fe20488b3f639e8390fe5a1fee700db02f9dfa686500418d5feae7eb05812b451d5f6b8d90ab4bfd3b85ba86a000bf723dae92e0aad47b40191d111230f110ab7211bb4a27f541e78d7110d8662d11", 0x9e, 0x8}, {&(0x7f00000003c0)="9d3c885e51500a17a751c13065b59e40840d4edf7288daf997fec2dc6814a2c87c078a9fecbfbcfbe42e6c105cc2c69ad8285f7443fc3bb65987f4e7643eade3bf46a934a961923b8cbae6d9bcb008342e86b515fa2ed9fea26c83a8bb8056a43f6148bcf6ba369b20aa28ec3fe9c625bb6c59b7940227e6a58c936470aa4b3259c59ed40cdfc600b54e6c54aaaef1dfad413adc5c76de8420f6de0d16591d625359154321a90a14177662f9516ce220b7d153067575afb098c790c04a62b0999a057469de3055410fc7b1944fc8ca7f7de5e666e5e8f4a486c4f6c7da91ca339ea97ff2642107dd252bbbf7748419", 0xef, 0x1}, {&(0x7f00000004c0)="c6e56a129b4e74f96d41204c9bed673026c57c0cc66d917ce10a2d2f8f0fc38d33570316e9838ba7d022d4693cf03281e943f5576cb1fce17e729c7d7e6aa55ba0a0a98db9742f0123daf5ac119ffa4ead17ca0345b290338e0c12a6cc319db05e3d367c726405e23108d795606bde0147c2bc45835cb54ccbfa864916711494333b300c28a5c1a9adae95e602858e07e7a0fabe60ce852779e5c7ff0d7a4f3568646220733d545f2f5223fc3e813387b8a700ba3c46977f3fc1efc7f4ccd15216c5d0b57cc1bea44666355577166708dabab1519d", 0xd5, 0x8}, {&(0x7f00000005c0)="c801fb9be2a64dcd9a8b33513af231a302d18427bd5edd382ffa29bd575505de3fddadd4db1d5457b9b18be709d237f69a2794e2bfea986833e4dab45d0bc5b04af50d55a13476acaac0d5f67d22978c1976fbc90e5f9c207554101b531c1f10eff676d381a8b63306fe91a6b5fab2b59a907cd64db14c1b9f75be56f765c2831d2278617cbf3325b7309a1f222b499b041e82a7c7068ff7add819a423b5152575d3f3b9fadec07f21ec715715470211e80330d08f18699d1d8467884486d7f55a4682c9be4128efa6c40c32", 0xcc, 0x211}, {&(0x7f00000006c0)="1f48f930ee5c945ed9d91138b00d855a148463f8c7ed237f233884ea8607ed366ff9a2bbab84c901d28e0c0c188fee804745b60deb70c2649825a0d5e1c19b97f4b922453a2430e7346c805f4863abdd55bb4545534720abaf1a216187b7e8f293b6510a1d6d07c0a38bfd109c439358b229287d478a4df711391a29256297b1fc2740f989a076fa087df3fe5ff06e942392e850e5da4ef1c59f0254177eb0a7d3712b7a83abd4cd7e1bf2e66643bcb7c4e769136e2c9817b15d7184539f27f8cbf99249ad7b29505ad8abc8abb6ffcb1d787a387feac7f71f5215a854ddfdf0362c301dcdf0c9b1c4817b8e5fd07138a623124c86", 0xf5, 0x4}, {&(0x7f00000007c0)="942fe189456ea136f89a3f1de0f9a2d1673a20a77192adff131f656bf43a45f039f7cf429f97e1184492e8aac839a9987fba431e42979e636558335fe8d5139a13002fe93ea7133b3565568963a59fef0b4926fdb8", 0x55, 0x10001}, {&(0x7f0000000840)="edb4e6000aac979102ddc493080f73a3e6f3b39d7db9a810780faf63d43c161aa1641876fe45aa4f6b4d0e515dd4c4d93a15c40709e47e96b3744ac392a79e0a4f77261c4f4bcd538d120d3d3054d0057daf28f39b05ff8c22b6618c7d0bc4194287c9262d551ff7cb44c8cc375dc8fb527e", 0x72, 0x10000}], 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB='journal_dev=0x0000000000000003,errors=continue,journal_ioprio=0x0000000000000005,nobarrier,prjquota,nodelalloc,bsddf,fsname=net/rpc\x00,euid<', @ANYRESDEC=r0, @ANYBLOB=',uid=', @ANYRESDEC=r1, @ANYBLOB="2c7365636c6162656c2c61707072616973655f747970a017696d916a0d39a9527034617369672c7063723d30303030303030303034303030303030303032352c736d61636b66736465663d6d643573"]) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rpc\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000080)) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) sendfile(r2, r3, 0x0, 0x320f) 19:33:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2200], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0310000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xa, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3b174349) [ 2829.258330][T10432] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 19:33:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 19:33:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0330000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2300], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:26 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x2) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) fcntl$dupfd(r0, 0x0, r1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r2, r3, 0x0, 0x320f) 19:33:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x17, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) 19:33:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2400], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:26 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3baa8455) 19:33:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0340000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 19:33:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x360f) 19:33:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2500], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0350000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3bafc549) 19:33:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 19:33:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1c, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2600], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0360000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000000)=0x755d, 0x4) sendfile(r0, r1, 0x0, 0x320f) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000080)=0xffffffff) 19:33:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) 19:33:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2c, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3bf57d68) 19:33:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2700], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0370000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x36, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) r2 = dup2(r1, r0) sendfile(r2, r2, &(0x7f0000000000), 0xcbf2) 19:33:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) 19:33:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2800], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0380000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3c278d36) 19:33:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x41, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0390000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d03]}, 0x48) 19:33:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000080)={0x0, @reserved}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000200)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000240)='s\x06t\x00\x00\x00\xb2f\xa2\xc5\xcc\x86\nb`\n+}Y$O\xb6\xaem\x98Qi\x97ZFx;!dF\xa4\xbeY\x06\xfd;\x95\xa1\x82/\xd4_\xac\xde\t\xba\rAFL\xb7\x7fk ad\xad\xc3\xdbx\xfb^\'\x1aX\xea\xb1k-\xf4\xcd\xa7\x12b\x16\xa6%\f\xbc\xf2\xdeQC:\v\x9fl7@\x9c\xab\xdaGy\xd0\xce\xac\xa3\x91(>\xbf\x16\x84Q\xad0|\xc8\xd8M{\xde\xbe:N\xe3\x11\xf5\xea\x98\xaf\xc6E\\\x87\xc6y\x1cd\xb9\xad^\x7f|\x9di\xc5\xb5\xf2$\xb0\xd8\xf3\xb2\xac\x059\xa5\xbc') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r2, 0x0, 0x320f) 19:33:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x45, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa03a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x2900], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:27 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3c385a50) 19:33:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9c01]}, 0x48) 19:33:27 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) ptrace$pokeuser(0x6, r0, 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r1, 0x0, 0xb20f) 19:33:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa03b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x3f00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x54, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() connect$netlink(r1, &(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x8108800}, 0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/ip6_flowlabel\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000000)={0x1, 0x1, [0x6, 0x7ff, 0x100000000, 0x1, 0x0, 0x4, 0x4, 0x6]}) sendfile(r1, r3, 0x0, 0x320f) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 19:33:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa03c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa002]}, 0x48) 19:33:27 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3cb9b99e) 19:33:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x55, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x3fff], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa03d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc200]}, 0x48) 19:33:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x304}, "4053541b22e4ecd2", "1ee9f5c54366f335b06372e31c25226b", "30259c40", "65873808219d3bd5"}, 0x28) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r0, 0x0, 0x320f) accept4(r0, &(0x7f0000000080)=@sco, &(0x7f0000000140)=0x80, 0x0) 19:33:27 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3de1e56e) 19:33:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x56, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x4000], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa03f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:27 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x4, 0x1}}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0xa0000, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x7, &(0x7f0000000080)={0x7}, 0x8) 19:33:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc03]}, 0x48) 19:33:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x63, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3e5ebd7d) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0400000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x4400], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf01]}, 0x48) 19:33:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x64, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0410000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x3) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/206, &(0x7f0000000000)=0xce) sendfile(r0, r1, 0x0, 0x320f) 19:33:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x7f00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0420000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3e6983ec) 19:33:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd801]}, 0x48) 19:33:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6d, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0430000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x80fe], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:28 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3e92fece) 19:33:28 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf402]}, 0x48) 19:33:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6e, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0440000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x88fe], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf403]}, 0x48) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0450000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0x9) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000080)=""/232) 19:33:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5f5e0ff, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3ea7ad36) 19:33:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xfc00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc03]}, 0x48) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xa0460000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x1, 0x400000) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0xb1, "ad5b3942d12213c0cc80e5b625a978a02ff65228c1323333478651d58f70d748bc84d4e9241546d29912c7345e8e87bfc6153d61d677a7d689b67289a56bfe3323e971666a5c60cccc117707f0c37409a8f6aa3cf6ed483ea6b6feb4c2ba1f255d51128f5cda9803851df5e2a048d9a9f62725b8670e28ef9744dc3de709f602f72721162e91c7e7b1c368aca9ba029b54882ef156fe04e6b69367c5f80e4a805108c981dd6403c080144c28b00d99e282"}, &(0x7f0000000080)=0xb9) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r1, 0x5}, &(0x7f0000000240)=0x8) getresgid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) setfsgid(r2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00') r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000280)=""/126) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)=0x16) sendfile(r4, r5, 0x0, 0x320f) 19:33:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xfe80], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0x18}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3eecab35) 19:33:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0000000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff61}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xfe88], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:28 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) futex(&(0x7f0000000000), 0x8f, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)=0x2, 0x0) sendfile(r0, r1, 0x0, 0x320f) 19:33:28 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3ef07b6c) 19:33:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d000]}, 0x48) 19:33:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0010000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff85}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}, 0x48) 19:33:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xff00], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:29 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x0) sendfile(r0, r1, 0x0, 0x320f) r2 = shmget(0x1, 0x1000, 0x78000c45, &(0x7f0000ffc000/0x1000)=nil) shmat(r2, &(0x7f0000ffc000/0x1000)=nil, 0x2000) 19:33:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0020000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3f3deb66) 19:33:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0x2}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xff01], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 19:33:29 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0030000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xff03], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0x3}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00100]}, 0x48) 19:33:29 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3f43deb2) 19:33:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0040000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xff07], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 19:33:29 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x3f549961) 19:33:29 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x201, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080)=0x7, 0x4) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r0, 0x0, 0x320f) 19:33:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0050000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0x4}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 19:33:29 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x40000000) 19:33:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xff0f], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 19:33:29 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x12000, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0x5}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0060000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x408da1d1) 19:33:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xff1f], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 19:33:29 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000180)={0x88, 0x412ee6f8, 0xbf0f, 0x6f, 0x401, 0x6}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r2, 0x204, 0x7, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x20}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendfile(r0, r1, 0x0, 0x320f) 19:33:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0x6}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0070000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 19:33:29 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x40cc7e99) 19:33:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xff3f], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0x7}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0x18) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x7fff}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={r2, 0xf79}, &(0x7f0000000240)=0x8) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000840)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x8000002}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x70, r3, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x47c}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe6d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x638c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x44}, 0x44010) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ppoll(&(0x7f0000000280)=[{r1, 0x40}, {r1, 0x8020}, {r1, 0xa000}, {r1, 0x8000}, {r1, 0x6000}, {r1, 0x20}, {r1, 0x400}], 0x7, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0x101}, 0x8) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000400)={{0xffffffffffffffff, 0x2, 0x1, 0x0, 0x1fbc}, 0x4, 0x401}) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000200)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x100000000, 0x0, 0x51, 0xffffffff, 0x9}, 0x14) ioctl$KVM_NMI(r1, 0xae9a) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000002c0)={0x7, 0x3}) connect$rds(r1, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000006c0)={'ip6gre0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x19}}}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000880)={0x2008}) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000100)={0x57, 0x2}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000380), &(0x7f00000003c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r1, 0x28, &(0x7f0000000300)}, 0x10) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000480)=@ipx, 0x80, &(0x7f0000000380)=[{&(0x7f0000000500)=""/163, 0xa3}], 0x1, &(0x7f00000005c0)=""/150, 0x96}, 0x10000) 19:33:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0080000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5010000]}, 0x48) 19:33:30 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x4100d33a) 19:33:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xff7f], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0x8}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x7, 0x6, 0xc4c, 0x1, 0x8, 0xa98, 0x4, 0x5, 0x5, 0x4000000000000000, 0x4, 0x9}, {0x3ff, 0xffffffffffff8001, 0x2, 0x0, 0x5, 0x8, 0x1000, 0x7ff, 0x1, 0x10000, 0x8, 0x4, 0x7ff}, {0x2644, 0x0, 0x9b7a, 0x3, 0x4, 0x5, 0x3, 0x4, 0x8000, 0x7, 0x7, 0x0, 0x2}], 0x2}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x320f) 19:33:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc0090000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 19:33:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1ffff], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:30 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x410e302b) 19:33:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0x9}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc00a0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x3ffff], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 19:33:30 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, &(0x7f0000000040), 0x0}, 0x18) sendfile(r0, r1, 0x0, 0x320f) 19:33:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0xa}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x412cb4c4) 19:33:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc00b0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x7ffff], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 19:33:30 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) eventfd(0x1) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x4040, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) r2 = getpgid(0xffffffffffffffff) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000180)) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='smDus\x00\xe0\t\x94\xd8\xa0}:\x1a\xd4\xcb\xf0\x8am\xd0\xfe\x80\xcbU!?+\x1c\x11\xfc\xc6J{\xa2\xc6\xc0\xce\xb4rl\xbc\xb9\xfb;\xab5I\xdck') lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r3, 0x0, 0xffffffff7fffffff) 19:33:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc00c0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x4151be2b) 19:33:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0xb}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0xfffff], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x48) 19:33:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc00d0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0xc}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/140, 0x8c}, {&(0x7f00000001c0)=""/76, 0x4c}], 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) r3 = syz_open_procfs(r2, &(0x7f0000dec000)='fd/3\x00') mknod(&(0x7f00000000c0)='./file0\x00', 0x9204, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r1, r3, 0x0, 0x320f) 19:33:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 19:33:30 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x41531b59) 19:33:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0xd}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x100000], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x48) 19:33:30 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x2) sysinfo(&(0x7f00000001c0)=""/213) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f00000000c0)={0x2, 0x1c, [0x40, 0x2e, 0x8, 0x7f, 0x2, 0x5, 0x5]}) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@dev={[], 0x19}, @empty, [], {@generic={0x6558, "8254d7a962b5790d0c49174b78271fcdd78dfb8654dead87dd17ad37404771447363b39b"}}}, &(0x7f0000000300)={0x1, 0x1, [0x4fe, 0x988, 0x5f, 0x8db]}) sendfile(r1, r2, 0x0, 0x320f) accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) 19:33:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc00e0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [0x1fffff], 0x0, 0x0}, 0x4}, @in6={0xa8aaaafffeaaaa17, 0x0, 0x0, @dev}], 0x38) 19:33:30 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="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") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x41811c9c) 19:33:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x33, 0xffffff84, 0xe}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 2833.892560][T26024] WARNING: CPU: 0 PID: 26024 at kernel/bpf/core.c:851 bpf_jit_free+0x1a8/0x1f0 [ 2833.901522][T26024] Kernel panic - not syncing: panic_on_warn set ... [ 2833.908121][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2833.915828][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2833.925899][T26024] Workqueue: events bpf_prog_free_deferred [ 2833.931703][T26024] Call Trace: [ 2833.934996][T26024] dump_stack+0x1d8/0x2f8 19:33:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}, [], {0x95, 0x0, 0x0, 0xc00f0000000000}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:33:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x48) 19:33:31 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x1) sendfile(r0, r1, 0x0, 0x6) 19:33:31 executing program 5: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000001400)="874a58bb51f3d1471484bf8d6154a24a585eb88f9ada92746f34642292419afab103cb061c631347e1d63db65f4936e29a7c30aa8aa6adf1e38cb8ad64b67e2c47317e2cc7bb6dab889b2f2adf88a51a93133b9e35311f72ee68c3ffd1b58f07e3f01da12bbe51414732a1727c28538e340dd6d63f3deb661b19b38a29a860ade95b04a52d5f46aa29faa253e58317c36b10b628e065efb5ae54601f505a383c12d45e78fa26bec592d83154a6e4bed156965090f33615208371e394ba519a8c0034ed1c8a1c3709cefe923ec04e0909b41daecea89ea07c93f6cc90ee948d9bf7bb222114ba1ca39f24621e8e769def537d601fe2d5156e24172df96fcbc0bfad984bb5a3bf05160c007766ccb09f8469f94ebf7dc3852fa8643871ccbcb703f2f5f01a575ba67f591b5341d0265e7a546b55a3475c0eb074c7cdaeec482cbb41a9daccc4d2082f32dff06979b070d869f5096aa539b273dde6a3013ef07b6cf8d41589790413b47297810fb0fafec41bc88019ad9b8c07009b28d07df038ca07303b8614903d35e061505bd8367ac54d45bd6708808d5645ca321b303708c736ada73e6199543f56325a77472e5343f56776968c2c7de6d26d03f2054636e8f07915b4dc772d421b9ade20b7b7008af8f3d5467bf464d5025a914898f18186219380d4863667cb0340dffbe7ebf1e1162d5d05e7723084c2a1c9c440cc7e9925e16816920ed30fe2242510291bb175c4b42c41f8903cc70c336e0d4943173b8f0b56c12f9fd6855569bd92375b09a419b9d94d094198b838f705203675b3af0c7210d898fb7ac187a681bf2806c2f970fa6f5547df388b4f1784d57090fdf722c1b05b5e7781c6f89c740556e03bd3cab163af640b7982e9d7b914514af4b0c7e7ce9d7dc0e36edd3d518819b3d2d34738dbc62dc28221c2980fb4115663c1f7cc728422752c16f174f412a4d6529bdb724cdc6f800c43a71a312c2cd63537331309a155de6ec51973e0801b58d46af6c65054f2c7dd495bce2508c91865eae5fc9803a5c19e8ecfa4ae77cbafb5ed97d7bb603975eb1620635f30561f2803b674a6582ca637c25df3f56fa8ff9ed52f76725c4da82f5781c6b9df61c3a8b2aab2d0b65d30990bc59f712f5c524dcb593ed9fe5fcf1b697b21faac26c5f600603bdbee0825e537dc9a159397d364072c6d92f3adad6a9ed9b4a0f08ae9c56f91bbaf13154df5458bc67d51860f1567f171812d1ee3a6292b300e41c10ee42dc8bacbbb0b0a8bd29e3d188a3bafc5491b1c8a16fa8b705735abec3ed1466f147c22059f9836f1b401b3028864822fcdb6013617bed5e809fd947632021f424a70f0fbc5e182357eda2929e1262a9a51ffb42db73de1e56e6041435d715322dc9b314d64e430fdbdaaab29fd3f43deb22fa263a0843318e35802c0deaed477eb9a3e161cfa8eb442487bdaa65ea9621d6b2d0b33") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba0\x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\x7f\x9c:\x1d\xd7\n\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#6\x87\xdc\xd3x9\xf9h\x10\xf3\x17|\xe4gJ\x8b\x85\xa5G\xd1\x00f\xd2\xde\x13]\xc3\xc2\xcf\x96\x8b]]^\xbd}H\xc7\xd9)\xec\x83i>f\x18\x86\xce-p?ck0sL.\xe5\xad\xe7\x85;q\b\xe2\t\x83\xf3H\xf1\xdf\xc4\xd0\x1d\v\xf8V\xe5\xe9!\x81H\xe2\xdb\xc6\\d|\xc6\xe7\x90R\xe8\xf19\xecV\x17\xfaN\xe6\xb6\xd5a\xf2\':5\xf1\xb3\xe3\xbfiC\xd3\x96\xc7\xc84\x8a\xad\\q\xfb\x88\x11]L\x8aq<\x17\xc2\xcb\x02\x17#\xc5&\x1d\xaf\xd8r7Z\xf4\x9c\x85A\x81\x1c\x9c\xae\xee\xfan\t\xf5\x80Kq\xc6\x8f\x1b\xe69\ng\x19i\xcd\xb3b\xda^\xe6c\xe8\x17\xfd\xec0F') setgroups(0x783, &(0x7f0000000080)=[0x0, 0x0]) pread64(r0, 0x0, 0x0, 0x41a9dacc) [ 2833.939335][T26024] panic+0x29b/0x7d9 [ 2833.942813][ T3907] kobject: 'loop4' (00000000478b092d): kobject_uevent_env [ 2833.943239][T26024] ? __warn+0x126/0x230 [ 2833.950341][ T3907] kobject: 'loop4' (00000000478b092d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2833.954448][T26024] ? nmi_panic+0x97/0x97 [ 2833.954457][T26024] ? __probe_kernel_read+0x14b/0x1a0 [ 2833.954471][T26024] ? bpf_jit_free+0x1a8/0x1f0 [ 2833.954479][T26024] ? is_valid_bugaddr+0x81/0x100 [ 2833.954487][T26024] __warn+0x22f/0x230 [ 2833.954495][T26024] ? bpf_jit_free+0x1a8/0x1f0 19:33:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x38, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x02', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0x48) [ 2833.954510][T26024] report_bug+0x190/0x290 [ 2833.954532][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2833.954540][T26024] #PF: supervisor read access in kernel mode [ 2834.010729][T26024] #PF: error_code(0x0000) - not-present page [ 2834.016707][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2834.023857][ T3907] kobject: 'loop1' (000000004326d324): kobject_uevent_env [ 2834.024250][T26024] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2834.036514][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2834.044226][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2834.051180][ T3907] kobject: 'loop1' (000000004326d324): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2834.054299][T26024] Workqueue: events bpf_prog_free_deferred [ 2834.054316][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2834.054324][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2834.054329][T26024] RSP: 0018:ffff8880901df758 EFLAGS: 00010806 [ 2834.054335][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2834.054339][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2834.054349][T26024] RBP: ffff8880901df790 R08: ffffffff81827ecb R09: 0000000000000001 [ 2834.125989][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2834.133950][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2834.141990][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2834.150892][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2834.157452][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2834.165399][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2834.173703][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2834.181651][T26024] Call Trace: [ 2834.184968][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2834.192658][T26024] #PF: supervisor read access in kernel mode [ 2834.198609][T26024] #PF: error_code(0x0000) - not-present page [ 2834.204555][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2834.212075][T26024] Oops: 0000 [#2] PREEMPT SMP KASAN [ 2834.217323][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2834.225009][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2834.235135][T26024] Workqueue: events bpf_prog_free_deferred [ 2834.240918][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2834.246779][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2834.266364][T26024] RSP: 0018:ffff8880901df2e0 EFLAGS: 00010806 [ 2834.272787][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2834.280751][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2834.288697][T26024] RBP: ffff8880901df318 R08: ffffffff81827ecb R09: 0000000000000001 [ 2834.296641][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2834.304597][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2834.312556][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2834.321468][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2834.328023][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2834.335973][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2834.343916][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2834.351861][T26024] Call Trace: [ 2834.355139][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2834.362823][T26024] #PF: supervisor read access in kernel mode [ 2834.369110][T26024] #PF: error_code(0x0000) - not-present page [ 2834.375062][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2834.382595][T26024] Oops: 0000 [#3] PREEMPT SMP KASAN [ 2834.387778][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2834.395462][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2834.405505][T26024] Workqueue: events bpf_prog_free_deferred [ 2834.411286][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2834.417166][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2834.436747][T26024] RSP: 0018:ffff8880901dee80 EFLAGS: 00010806 [ 2834.442786][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2834.450732][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2834.458682][T26024] RBP: ffff8880901deeb8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2834.466624][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2834.474955][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2834.482902][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2834.491799][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2834.498529][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2834.506483][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2834.514534][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2834.522494][T26024] Call Trace: [ 2834.525775][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2834.533465][T26024] #PF: supervisor read access in kernel mode [ 2834.539434][T26024] #PF: error_code(0x0000) - not-present page [ 2834.545384][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2834.552904][T26024] Oops: 0000 [#4] PREEMPT SMP KASAN [ 2834.558081][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2834.565765][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2834.576160][T26024] Workqueue: events bpf_prog_free_deferred [ 2834.581975][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2834.587840][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2834.607429][T26024] RSP: 0018:ffff8880901dea20 EFLAGS: 00010806 [ 2834.613483][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2834.621429][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2834.629374][T26024] RBP: ffff8880901dea58 R08: ffffffff81827ecb R09: 0000000000000001 [ 2834.637318][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2834.645274][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2834.653220][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2834.662121][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2834.669026][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2834.676974][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2834.684919][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2834.692862][T26024] Call Trace: [ 2834.696140][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2834.703824][T26024] #PF: supervisor read access in kernel mode [ 2834.709859][T26024] #PF: error_code(0x0000) - not-present page [ 2834.715891][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2834.723413][T26024] Oops: 0000 [#5] PREEMPT SMP KASAN [ 2834.728596][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2834.736368][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2834.746408][T26024] Workqueue: events bpf_prog_free_deferred [ 2834.752206][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2834.762504][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2834.782964][T26024] RSP: 0018:ffff8880901de5c0 EFLAGS: 00010806 [ 2834.789003][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2834.796949][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2834.804985][T26024] RBP: ffff8880901de5f8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2834.812942][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2834.820889][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2834.828834][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2834.837745][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2834.844300][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2834.852252][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2834.860195][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2834.868462][T26024] Call Trace: [ 2834.871756][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2834.879440][T26024] #PF: supervisor read access in kernel mode [ 2834.885386][T26024] #PF: error_code(0x0000) - not-present page [ 2834.891332][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2834.898858][T26024] Oops: 0000 [#6] PREEMPT SMP KASAN [ 2834.904027][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2834.911711][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2834.921748][T26024] Workqueue: events bpf_prog_free_deferred [ 2834.927546][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2834.933410][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2834.953269][T26024] RSP: 0018:ffff8880901de160 EFLAGS: 00010806 [ 2834.959308][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2834.967474][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2834.975419][T26024] RBP: ffff8880901de198 R08: ffffffff81827ecb R09: 0000000000000001 [ 2834.983365][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2834.992215][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2835.000164][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2835.009066][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2835.015622][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2835.023567][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2835.031511][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2835.039455][T26024] Call Trace: [ 2835.042733][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2835.050418][T26024] #PF: supervisor read access in kernel mode [ 2835.056377][T26024] #PF: error_code(0x0000) - not-present page [ 2835.062324][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2835.070178][T26024] Oops: 0000 [#7] PREEMPT SMP KASAN [ 2835.075355][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2835.083037][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2835.093074][T26024] Workqueue: events bpf_prog_free_deferred [ 2835.098856][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2835.104720][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2835.124294][T26024] RSP: 0018:ffff8880901ddd00 EFLAGS: 00010806 [ 2835.130329][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2835.138273][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2835.146216][T26024] RBP: ffff8880901ddd38 R08: ffffffff81827ecb R09: 0000000000000001 [ 2835.154163][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2835.162106][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2835.170433][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2835.179332][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2835.185889][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2835.193842][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2835.201790][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2835.209734][T26024] Call Trace: [ 2835.213019][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2835.220704][T26024] #PF: supervisor read access in kernel mode [ 2835.226653][T26024] #PF: error_code(0x0000) - not-present page [ 2835.232600][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2835.240352][T26024] Oops: 0000 [#8] PREEMPT SMP KASAN [ 2835.245530][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2835.253218][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2835.263260][T26024] Workqueue: events bpf_prog_free_deferred [ 2835.269413][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2835.275278][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2835.294864][T26024] RSP: 0018:ffff8880901dd8a0 EFLAGS: 00010806 [ 2835.300902][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2835.308849][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2835.316798][T26024] RBP: ffff8880901dd8d8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2835.324916][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2835.332872][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2835.340952][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2835.349853][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2835.356413][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2835.364363][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2835.372678][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2835.380623][T26024] Call Trace: [ 2835.383901][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2835.391596][T26024] #PF: supervisor read access in kernel mode [ 2835.397555][T26024] #PF: error_code(0x0000) - not-present page [ 2835.403514][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2835.411124][T26024] Oops: 0000 [#9] PREEMPT SMP KASAN [ 2835.416318][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2835.424006][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2835.434051][T26024] Workqueue: events bpf_prog_free_deferred [ 2835.439846][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2835.445725][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2835.465301][T26024] RSP: 0018:ffff8880901dd440 EFLAGS: 00010806 [ 2835.471710][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2835.479655][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2835.487603][T26024] RBP: ffff8880901dd478 R08: ffffffff81827ecb R09: 0000000000000001 [ 2835.495562][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2835.503510][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2835.511456][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2835.520369][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2835.526926][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2835.535056][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2835.543001][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2835.550945][T26024] Call Trace: [ 2835.554218][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2835.561901][T26024] #PF: supervisor read access in kernel mode [ 2835.568222][T26024] #PF: error_code(0x0000) - not-present page [ 2835.574170][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2835.581695][T26024] Oops: 0000 [#10] PREEMPT SMP KASAN [ 2835.586956][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2835.594641][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2835.604682][T26024] Workqueue: events bpf_prog_free_deferred [ 2835.610464][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2835.616336][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2835.636194][T26024] RSP: 0018:ffff8880901dcfe0 EFLAGS: 00010806 [ 2835.642233][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2835.650272][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2835.658220][T26024] RBP: ffff8880901dd018 R08: ffffffff81827ecb R09: 0000000000000001 [ 2835.666178][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2835.674496][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2835.682446][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2835.691350][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2835.697918][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2835.705869][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2835.713817][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2835.721861][T26024] Call Trace: [ 2835.725139][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2835.732912][T26024] #PF: supervisor read access in kernel mode [ 2835.738869][T26024] #PF: error_code(0x0000) - not-present page [ 2835.744838][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2835.752626][T26024] Oops: 0000 [#11] PREEMPT SMP KASAN [ 2835.757893][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2835.766010][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2835.776494][T26024] Workqueue: events bpf_prog_free_deferred [ 2835.782280][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2835.788155][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2835.807731][T26024] RSP: 0018:ffff8880901dcb80 EFLAGS: 00010806 [ 2835.813767][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2835.822802][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2835.830751][T26024] RBP: ffff8880901dcbb8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2835.838730][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2835.846676][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2835.854632][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2835.863531][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2835.870579][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2835.878533][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2835.886481][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2835.894422][T26024] Call Trace: [ 2835.897701][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2835.905384][T26024] #PF: supervisor read access in kernel mode [ 2835.911333][T26024] #PF: error_code(0x0000) - not-present page [ 2835.917289][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2835.924838][T26024] Oops: 0000 [#12] PREEMPT SMP KASAN [ 2835.930096][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2835.937781][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2835.947844][T26024] Workqueue: events bpf_prog_free_deferred [ 2835.953630][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2835.959494][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2835.979809][T26024] RSP: 0018:ffff8880901dc720 EFLAGS: 00010806 [ 2835.986113][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2835.994058][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2836.002002][T26024] RBP: ffff8880901dc758 R08: ffffffff81827ecb R09: 0000000000000001 [ 2836.009956][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2836.017921][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2836.025892][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2836.034795][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2836.041371][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2836.049321][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2836.057269][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2836.065399][T26024] Call Trace: [ 2836.069190][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2836.076875][T26024] #PF: supervisor read access in kernel mode [ 2836.082830][T26024] #PF: error_code(0x0000) - not-present page [ 2836.088781][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2836.096302][T26024] Oops: 0000 [#13] PREEMPT SMP KASAN [ 2836.101559][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2836.109241][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2836.119278][T26024] Workqueue: events bpf_prog_free_deferred [ 2836.125072][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2836.130945][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2836.150520][T26024] RSP: 0018:ffff8880901dc2c0 EFLAGS: 00010806 [ 2836.156557][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2836.164502][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2836.172803][T26024] RBP: ffff8880901dc2f8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2836.180754][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2836.188788][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2836.196739][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2836.205640][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2836.212209][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2836.220155][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2836.228112][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2836.236054][T26024] Call Trace: [ 2836.239334][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2836.247021][T26024] #PF: supervisor read access in kernel mode [ 2836.252970][T26024] #PF: error_code(0x0000) - not-present page [ 2836.258937][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2836.266456][T26024] Oops: 0000 [#14] PREEMPT SMP KASAN [ 2836.272046][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2836.279730][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2836.289766][T26024] Workqueue: events bpf_prog_free_deferred [ 2836.295550][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2836.301422][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2836.321087][T26024] RSP: 0018:ffff8880901dbe60 EFLAGS: 00010806 [ 2836.327128][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2836.335086][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2836.343032][T26024] RBP: ffff8880901dbe98 R08: ffffffff81827ecb R09: 0000000000000001 [ 2836.350976][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2836.358923][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2836.366869][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2836.376512][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2836.383088][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2836.391048][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2836.399083][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2836.407024][T26024] Call Trace: [ 2836.410308][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2836.417997][T26024] #PF: supervisor read access in kernel mode [ 2836.423946][T26024] #PF: error_code(0x0000) - not-present page [ 2836.429892][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2836.437430][T26024] Oops: 0000 [#15] PREEMPT SMP KASAN [ 2836.442689][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2836.450371][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2836.460404][T26024] Workqueue: events bpf_prog_free_deferred [ 2836.466188][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2836.472419][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2836.491997][T26024] RSP: 0018:ffff8880901dba00 EFLAGS: 00010806 [ 2836.498033][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2836.505978][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2836.513923][T26024] RBP: ffff8880901dba38 R08: ffffffff81827ecb R09: 0000000000000001 [ 2836.521869][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2836.529814][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2836.537760][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2836.546670][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2836.553228][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2836.561349][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2836.569624][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2836.577688][T26024] Call Trace: [ 2836.580966][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2836.588650][T26024] #PF: supervisor read access in kernel mode [ 2836.594609][T26024] #PF: error_code(0x0000) - not-present page [ 2836.600554][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2836.608074][T26024] Oops: 0000 [#16] PREEMPT SMP KASAN [ 2836.613333][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2836.621017][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2836.631053][T26024] Workqueue: events bpf_prog_free_deferred [ 2836.636839][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2836.642704][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2836.662369][T26024] RSP: 0018:ffff8880901db5a0 EFLAGS: 00010806 [ 2836.668746][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2836.676697][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2836.684644][T26024] RBP: ffff8880901db5d8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2836.692677][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2836.700624][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2836.708569][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2836.717478][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2836.724043][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2836.731994][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2836.739941][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2836.747885][T26024] Call Trace: [ 2836.751163][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2836.758890][T26024] #PF: supervisor read access in kernel mode [ 2836.764852][T26024] #PF: error_code(0x0000) - not-present page [ 2836.771176][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2836.778965][T26024] Oops: 0000 [#17] PREEMPT SMP KASAN [ 2836.784223][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2836.791905][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2836.801943][T26024] Workqueue: events bpf_prog_free_deferred [ 2836.807727][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2836.813619][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2836.833329][T26024] RSP: 0018:ffff8880901db140 EFLAGS: 00010806 [ 2836.839388][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2836.847347][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2836.855291][T26024] RBP: ffff8880901db178 R08: ffffffff81827ecb R09: 0000000000000001 [ 2836.863242][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2836.871507][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2836.879454][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2836.888353][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2836.894908][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2836.902861][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2836.910804][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2836.918750][T26024] Call Trace: [ 2836.922029][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2836.929715][T26024] #PF: supervisor read access in kernel mode [ 2836.935664][T26024] #PF: error_code(0x0000) - not-present page [ 2836.941613][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2836.949142][T26024] Oops: 0000 [#18] PREEMPT SMP KASAN [ 2836.954400][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2836.962087][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2836.972454][T26024] Workqueue: events bpf_prog_free_deferred [ 2836.978238][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2836.984110][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2837.004626][T26024] RSP: 0018:ffff8880901dace0 EFLAGS: 00010806 [ 2837.010689][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2837.018648][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2837.026593][T26024] RBP: ffff8880901dad18 R08: ffffffff81827ecb R09: 0000000000000001 [ 2837.034542][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2837.042486][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2837.050434][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2837.059604][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2837.066163][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2837.074437][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2837.082384][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2837.090338][T26024] Call Trace: [ 2837.093708][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2837.101397][T26024] #PF: supervisor read access in kernel mode [ 2837.107440][T26024] #PF: error_code(0x0000) - not-present page [ 2837.113387][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2837.121009][T26024] Oops: 0000 [#19] PREEMPT SMP KASAN [ 2837.126363][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2837.134072][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2837.144240][T26024] Workqueue: events bpf_prog_free_deferred [ 2837.150037][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2837.155904][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2837.175915][T26024] RSP: 0018:ffff8880901da880 EFLAGS: 00010806 [ 2837.181964][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2837.189916][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2837.197875][T26024] RBP: ffff8880901da8b8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2837.205833][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2837.213778][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2837.221811][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2837.230721][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2837.237280][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2837.245228][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2837.253187][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2837.261138][T26024] Call Trace: [ 2837.264419][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2837.272463][T26024] #PF: supervisor read access in kernel mode [ 2837.278678][T26024] #PF: error_code(0x0000) - not-present page [ 2837.284633][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2837.292155][T26024] Oops: 0000 [#20] PREEMPT SMP KASAN [ 2837.297416][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2837.305114][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2837.315151][T26024] Workqueue: events bpf_prog_free_deferred [ 2837.321018][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2837.326881][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2837.346471][T26024] RSP: 0018:ffff8880901da420 EFLAGS: 00010806 [ 2837.352509][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2837.360452][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2837.368792][T26024] RBP: ffff8880901da458 R08: ffffffff81827ecb R09: 0000000000000001 [ 2837.376926][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2837.384872][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2837.392818][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2837.401984][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2837.408538][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2837.416484][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2837.424515][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2837.432458][T26024] Call Trace: [ 2837.435738][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2837.443437][T26024] #PF: supervisor read access in kernel mode [ 2837.449387][T26024] #PF: error_code(0x0000) - not-present page [ 2837.455338][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2837.462856][T26024] Oops: 0000 [#21] PREEMPT SMP KASAN [ 2837.468430][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2837.476113][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2837.486167][T26024] Workqueue: events bpf_prog_free_deferred [ 2837.491949][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2837.497909][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2837.517756][T26024] RSP: 0018:ffff8880901d9fc0 EFLAGS: 00010806 [ 2837.523800][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2837.531833][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2837.539820][T26024] RBP: ffff8880901d9ff8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2837.547777][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2837.555719][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2837.563698][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2837.573077][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2837.579638][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2837.587596][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2837.595626][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2837.603570][T26024] Call Trace: [ 2837.606844][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2837.614531][T26024] #PF: supervisor read access in kernel mode [ 2837.620478][T26024] #PF: error_code(0x0000) - not-present page [ 2837.626439][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2837.633961][T26024] Oops: 0000 [#22] PREEMPT SMP KASAN [ 2837.639220][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2837.646906][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2837.656947][T26024] Workqueue: events bpf_prog_free_deferred [ 2837.662728][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2837.668922][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2837.688604][T26024] RSP: 0018:ffff8880901d9b60 EFLAGS: 00010806 [ 2837.694654][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2837.702606][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2837.710549][T26024] RBP: ffff8880901d9b98 R08: ffffffff81827ecb R09: 0000000000000001 [ 2837.718494][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2837.726451][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2837.734395][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2837.743293][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2837.757228][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2837.765177][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2837.773493][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2837.781437][T26024] Call Trace: [ 2837.784716][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2837.792401][T26024] #PF: supervisor read access in kernel mode [ 2837.798347][T26024] #PF: error_code(0x0000) - not-present page [ 2837.804309][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2837.811828][T26024] Oops: 0000 [#23] PREEMPT SMP KASAN [ 2837.817087][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2837.826297][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2837.836338][T26024] Workqueue: events bpf_prog_free_deferred [ 2837.842126][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2837.847990][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2837.867985][T26024] RSP: 0018:ffff8880901d9700 EFLAGS: 00010806 [ 2837.874025][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2837.881978][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2837.889922][T26024] RBP: ffff8880901d9738 R08: ffffffff81827ecb R09: 0000000000000001 [ 2837.897867][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2837.905818][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2837.913771][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2837.922674][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2837.929228][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2837.937177][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2837.945123][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2837.953068][T26024] Call Trace: [ 2837.956346][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2837.964031][T26024] #PF: supervisor read access in kernel mode [ 2837.970277][T26024] #PF: error_code(0x0000) - not-present page [ 2837.976226][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2837.983759][T26024] Oops: 0000 [#24] PREEMPT SMP KASAN [ 2837.989017][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2837.996719][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2838.006757][T26024] Workqueue: events bpf_prog_free_deferred [ 2838.012540][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2838.018403][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2838.037979][T26024] RSP: 0018:ffff8880901d92a0 EFLAGS: 00010806 [ 2838.044032][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2838.051999][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2838.059956][T26024] RBP: ffff8880901d92d8 R08: ffffffff81827ecb R09: 0000000000000001 [ 2838.068267][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2838.076212][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2838.084156][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2838.093069][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2838.099622][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2838.107572][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2838.115515][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2838.123456][T26024] Call Trace: [ 2838.126736][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2838.134419][T26024] #PF: supervisor read access in kernel mode [ 2838.140367][T26024] #PF: error_code(0x0000) - not-present page [ 2838.146317][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2838.153839][T26024] Oops: 0000 [#25] PREEMPT SMP KASAN [ 2838.159098][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2838.166782][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2838.177132][T26024] Workqueue: events bpf_prog_free_deferred [ 2838.182918][T26024] RIP: 0010:is_bpf_text_address+0x201/0x3b0 [ 2838.188783][T26024] Code: 65 64 f5 ff 4d 39 f4 76 10 e8 5b 62 f5 ff 49 83 c7 10 eb 46 0f 1f 44 00 00 4c 89 e0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 75 7d 41 8b 1c 24 48 c1 e3 0c 4c 01 e3 48 89 df [ 2838.208362][T26024] RSP: 0018:ffff8880901d8e40 EFLAGS: 00010806 [ 2838.214409][T26024] RAX: 1ffffffff4002000 RBX: 0000000000000001 RCX: dffffc0000000000 [ 2838.222358][T26024] RDX: ffff88805ead2580 RSI: ffffffffff7b0d93 RDI: ffffffffa0010000 [ 2838.230301][T26024] RBP: ffff8880901d8e78 R08: ffffffff81827ecb R09: 0000000000000001 [ 2838.238265][T26024] R10: fffffbfff11fbdfd R11: 0000000000000000 R12: ffffffffa0010000 [ 2838.246301][T26024] R13: 0000000000000000 R14: ffffffffff7b0d93 R15: ffff88808b5e80f8 [ 2838.254248][T26024] FS: 0000000000000000(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 2838.263147][T26024] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2838.270014][T26024] CR2: fffffbfff4002000 CR3: 000000009c2d3000 CR4: 00000000001406f0 [ 2838.278048][T26024] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2838.286167][T26024] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2838.294109][T26024] Call Trace: [ 2838.297385][T26024] BUG: unable to handle page fault for address: fffffbfff4002000 [ 2838.305243][T26024] #PF: supervisor read access in kernel mode [ 2838.311189][T26024] #PF: error_code(0x0000) - not-present page [ 2838.317137][T26024] PGD 21ffee067 P4D 21ffee067 PUD 21ffed067 PMD 95684067 PTE 0 [ 2838.324657][T26024] Thread overran stack, or stack corrupted [ 2838.330434][T26024] Oops: 0000 [#26] PREEMPT SMP KASAN [ 2838.335689][T26024] CPU: 0 PID: 26024 Comm: kworker/0:3 Not tainted 5.3.0-rc2+ #57 [ 2838.343373][T26024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011