0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:02 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(0xffffffffffffffff) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 570.050245] input: syz1 as /devices/virtual/input/input153 [ 570.165018] input: syz1 as /devices/virtual/input/input154 07:28:02 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(0xffffffffffffffff) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x2}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x10001, 0x100000000, 0x0, 0xa, 0x15, 0xd, "980798281db42625b81768145874d6f7edfd4a763d321fd9f4acd836519073e3c02ace2e29b096880bfb23355483435058f0db5975bb519a3ca0f57015a0dd4b", "841776d3e61f6ccd938b1758a2a03d87d8e9326d7fc632a635aa21e1bba6efdcada7d58c515ccd423fae0856c809dcd88c8f8dc77cb7b86beb9a5810125796a7", "7e6c1c8450d77fc0be4727c380cd30b20272717c45cfcbd1bb15a52ad681a24c", [0x80000000, 0x200]}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r6, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r8 = syz_open_procfs(r7, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r8, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000001c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() setreuid(r11, 0x0) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) fstat(r12, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = geteuid() setreuid(r14, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000400)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r16, @ANYBLOB="a0a13781ae73a622839ee904cde197ff48c3cff0"]) r17 = geteuid() setreuid(r17, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r19, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) fstat(r19, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) r22 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r22, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) fstat(r22, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) write$FUSE_DIRENTPLUS(r6, &(0x7f0000000880)={0x570, 0x0, 0x8, [{{0x2, 0x1, 0x1000, 0x52a2209c, 0x3, 0xbd44, {0x4, 0x3, 0x4, 0x8, 0x2d2a, 0x1, 0x0, 0x0, 0x4, 0xeef, 0x4a, r9, r10, 0x5, 0x101}}, {0x6, 0x3, 0x12, 0x3, '/dev/snd/pcmC#D#c\x00'}}, {{0x3, 0x2, 0x6eea, 0x1, 0x7, 0xfff, {0x6, 0x4, 0xdf, 0x3ff, 0x0, 0x2, 0x7fffffff, 0xa707, 0x4, 0xffffffff, 0x6, r11, 0xee00, 0x8de6, 0x38db5769}}, {0x2, 0x6, 0x13, 0x5, '&em0selinuxeth0eth1'}}, {{0x5, 0x0, 0x7235, 0x78e7ef28, 0x8, 0x8, {0x4, 0x0, 0x0, 0x7, 0x2, 0x8, 0x8, 0x8, 0x2c, 0x2, 0x0, 0xee00, r13, 0xfff, 0x1f}}, {0x6, 0x9, 0x0, 0x1}}, {{0x5, 0x2, 0x8, 0x132, 0x3ff, 0x7, {0x5, 0x9, 0x100000000, 0x190600000, 0xfffffffffffffffe, 0x4, 0xffff8d95, 0x9, 0x5, 0x6, 0x9, r14, r16, 0x83, 0x6}}, {0x3, 0x2, 0x12, 0x5, '/dev/snd/pcmC#D#c\x00'}}, {{0x4, 0x2, 0x7, 0xff, 0x4, 0x100, {0x5, 0x7, 0x8, 0x0, 0x6, 0x1, 0x7, 0x8001, 0x1, 0x2, 0x91, r17, r18, 0x7, 0x1}}, {0x3, 0x6c, 0x9, 0x101, 'wlan1eth1'}}, {{0x1, 0x3, 0x1, 0x5, 0x5, 0x40, {0x1, 0x4, 0x5, 0x0, 0x99e, 0x3, 0xfffffffb, 0x4a, 0x13, 0x9, 0xa052, r20, 0xee00, 0xfffffeff, 0x100}}, {0x2, 0x10001, 0x12, 0x2, '/dev/snd/pcmC#D#c\x00'}}, {{0x5, 0x0, 0x5, 0x6, 0x5, 0x2, {0x2, 0xfffffffffffffffb, 0x2, 0x7, 0x100, 0x7fffffff, 0x5, 0x1, 0x20, 0x2, 0x7e, r21, r23, 0x400, 0x401}}, {0x4, 0x7, 0x12, 0x1, '/dev/snd/pcmC#D#c\x00'}}, {{0x0, 0x0, 0xfbd, 0x7ff, 0xb7, 0x2, {0x3, 0x1, 0x3, 0x3ff, 0x1, 0x7, 0x6f81, 0x7, 0xffff, 0xfffffffa, 0x2, 0x0, r24, 0x8001, 0xb09}}, {0x6, 0x8, 0x12, 0x9, '/dev/snd/pcmC#D#c\x00'}}]}, 0x570) r25 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r26 = fcntl$dupfd(r4, 0x0, r25) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) r27 = dup2(r0, r3) dup3(r27, r1, 0x0) 07:28:03 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x107282, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)) 07:28:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 570.457076] hfsplus: unable to parse mount options [ 570.493598] input: syz1 as /devices/virtual/input/input155 07:28:03 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(0xffffffffffffffff) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 570.586261] input: syz1 as /devices/virtual/input/input156 07:28:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, 0x0, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r3, 0x4008550d, &(0x7f0000000100)) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r5 = socket(0x2, 0x803, 0xff) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r7 = fcntl$dupfd(r5, 0x0, r6) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r9 = fcntl$dupfd(0xffffffffffffffff, 0x406, r8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r9, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) r10 = dup2(r0, r4) dup3(r10, r1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r12 = syz_open_procfs(r11, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r12, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r12, 0x84, 0x23, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r12, 0x84, 0x12, &(0x7f00000000c0)=0x8, 0x4) 07:28:03 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8d]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xcc, 0x2000) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000040)=""/11) r2 = fanotify_init(0x1, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f00000000c0)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) getsockname$inet(r4, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) 07:28:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x3}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:03 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r5) r6 = dup3(0xffffffffffffffff, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 570.880464] input: syz1 as /devices/virtual/input/input157 07:28:03 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r5) r6 = dup3(0xffffffffffffffff, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 571.067253] input: syz1 as /devices/virtual/input/input158 07:28:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x4}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:03 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r5) r6 = dup3(0xffffffffffffffff, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) close(0xffffffffffffffff) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x0, 0x1}, 0x16, 0x0, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000440)={r5, 0x0, 0x8, 0x0, 0x0, 0x1, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r5, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001b00)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x4, 0x3, 0x10000, 0x7}, &(0x7f0000001bc0)=0x98) sendmsg$inet_sctp(r3, &(0x7f0000001d40)={&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x3cc94538, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9b3}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000740)="e36a4958a4caec1c14798c9fad47c1884484e60784467a4109adfa222d385e640f2eea59362320cf678396894e92c816d076b1d99e069adae01350ccea8608e962300d7bc96efcff179a4079520992599985ea67e8ffe25123ff0f003c7ed0f1d65396e99aaccb0848916acf92518d0c493886055e9863bfe345b42503805389e5afbd1f7d94a760bb0d3ecbe23f0f875f6d0fcec265a59cb79892e91176d583f72d75832886424b9464f6074108b157306fffbca0f1506660abb2569c669e11ed2ae38fe131c2f36369febdde81072a554ca05279bbefc9fcc6d417c59e27fa20d9504b6310", 0xe6}, {&(0x7f00000008c0)="76f5615c727abd9b0e673d8a54e87dc33296c5c7c69bfc0f58cadd620f2d7cb89eeedf998c9ea4094dddbf29d311fabbadff22bd1c08da3e51e83fdd2a3db156c70d8890d41c645fd0f38b0dec0237b8beb2fe4f896342a3f2809721508098986b0bbce1820036aac4264f216442c4cda44dcd8c13fc095f52dc6c08531a8a7ff036e1d408c563fe4214e24cbe0f0bb3904e64150956338505288ac17adf25632f838bd3dfd5319dc9319ab1e67cae31281b63a12a01975e2b1a5e4eeb7b01", 0xbf}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="0acc897be9ee424370b63b056a3b4c586f8c059404251e7c337befbf0bb106776306852d83d47721a217d0c92cb9e8f14ce906bf3b33245466ce7cfe7e8e84b472a44f941a57983478e2606582a83f250d341e65838a832bd230809549461209c7a1eaf0bf", 0x65}, {&(0x7f0000001a00)="84f4e2ba2eb8631dc3c67837e21a8d94cee631ec5b00b0a9b4f1234898c5feecd86e528b43794ecdbfadfa222e88e3e7b11bc4b58dd3c4b91156b5a4741bc3e6a37afe468cc8347b9103ae6eaa378647c03d3e14b1d3a3927c4deefe271dc902b4c6b08e67e7c714a47509", 0x6b}], 0x5, &(0x7f0000001c00)=[@sndrcv={0x30, 0x84, 0x1, {0x7, 0x2, 0x8000, 0x4df, 0x80, 0x79, 0x1, 0x5, r5}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xffff, 0xa, 0x5, 0x0, 0x3, 0x6, 0x8, r6}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xfffffff8}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x3, 0x1f, 0x7f}}], 0x128, 0x1}, 0x40000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={r5, 0xea5}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000000100)=@sack_info={r7, 0x3, 0x5}, &(0x7f0000002000)=0xfffffffffffffebc) r8 = socket(0x2, 0x803, 0xff) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) write$FUSE_WRITE(r9, &(0x7f0000000000)={0x18, 0x0, 0x7, {0x2}}, 0x18) r10 = fcntl$dupfd(r8, 0x0, r9) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = dup2(r0, r2) dup3(r11, r1, 0x0) 07:28:03 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:04 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 571.413674] input: syz1 as /devices/virtual/input/input159 [ 571.515332] input: syz1 as /devices/virtual/input/input160 07:28:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) flistxattr(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f00000014c0)}}, 0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r9 = syz_open_procfs(r8, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r9, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r9, 0x84, 0x23, 0x0, 0x0) connect$bt_rfcomm(r9, &(0x7f0000000000)={0x1f, {0x4, 0x3f, 0xa0, 0x7, 0x0, 0x81}, 0x20}, 0xa) dup3(r7, r1, 0x0) 07:28:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:04 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:04 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000000)) 07:28:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x5}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f0000000000)={&(0x7f00000001c0)=""/224, 0xe0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r3, 0x10, &(0x7f0000000140)={&(0x7f0000000080)=""/83, 0x53, r4}}, 0x10) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r6 = socket(0x2, 0x803, 0xff) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = dup2(r0, r5) dup3(r9, r1, 0x0) [ 571.861410] input: syz1 as /devices/virtual/input/input161 07:28:04 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 572.104899] input: syz1 as /devices/virtual/input/input162 07:28:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:04 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000011000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r7, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x2000006) r8 = dup2(r0, r3) dup3(r8, r1, 0x0) 07:28:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r7, &(0x7f00000003c0), 0x63) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:05 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000)={0x3, 0xad5, 0x5, 0x5, 0x5a}, 0x14) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 572.536060] input: syz1 as /devices/virtual/input/input163 07:28:05 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:05 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000006540)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x2711, @reserved}, 0x80, &(0x7f0000002900)=[{&(0x7f0000000240)="07af5df34f239909dc85b047c57e1cbdb06b18f3ee3ec81289f20ef65f045e1bcbaa9e12c208ed6c1b6cfeb631804839a8c7ff24a0c898bc6b7536189fc14323eb9c54475b0e7cf007835be9941a1df290b8fddbdb287e15a94c384e72e1ae063e", 0x61}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000140)="5c90048bad6285bbe4dde0c5124e179af19ec024595ffea8f7832c6d5da94a793e08b6036dfa083150df8a89", 0x2c}, {&(0x7f00000002c0)="3ba8096ec5031242501645de5f911724980ef25d723d5aae25e10cfda72887ccecbc6b1e65f9490844763bfcd90d8b89c8284aa5efacd19a70371d184d997221625fb08dc6ab10c2f36d131d62f12469adbd76060a985694b5337b03951a7db1e3a57d1d53a336e9975eae49f4ee22a446d247aa3765a6f0c3f8753f7797e38d61345257fa19fef610c734c5b09255ea53936b523f2790854eeb3e22f17a23d8f9ab5aed743cd57414bcc3728d825f8e141018bf1e7d97c42e8fb41116fc30445037c447c6edccf31e47fcde1cbc6bb9", 0xd0}, {&(0x7f00000003c0)="a0acdc3cc3c715d65c9ddd33ad2d30cc6a1f366bc2a89ff20d99a3c71fab0d6220a7c3853b9014574c5dcfbef2", 0x2d}, {&(0x7f0000001880)="6a45de26026292885ac62b66337ab02fbd381feae1f7e36011726f3c3f76e527da68d909fc54b638f7e3f35d5eda38d8960083207cec1ecd4785995197f0e3ac29bc7ccfc99e5adf399318cf43", 0x4d}, {&(0x7f0000001900)="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", 0x1000}], 0x7, &(0x7f0000002980)=[{0xc0, 0x102, 0x7ff, "8435dd340f2771ce2a23c347a9923954f856b2cdfe865d951997832a528016ac8b34039b85d859a887a520a145edd223ac45004a4475b3f53696b5f18aaa2653c65c7540f6cf8909fe393ddd23a3e0c41d112d3089df7659e9fe8da3a7e73ad7b0bdf93b5e8b31a6b11744055331962e059f08189a5665b82534621a6c24ef78383cf217b1a9f150065328bd621a8952762111d46d7bbc15b8683f2711ffc03f8110fd1e42e2f3f402f9de18b614cbbd"}, {0x78, 0x29, 0x80, "35a3ddff316df570994aa255a5428f000839bb7982ab953ef931791adb40b9ae50251d5c531cd45446a85e17e644b65de6ce39a553c66080869421c82ec4a9b70a574b01769493cb541920d6b362136322a5b12ff32ec7e0fbb6b9cf749e305b1d689ffbdac43fd4"}], 0x138}}, {{0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000002ac0)="58fd6e6ec7046ab2687a342ddb50cdc7a2985a67818d21d4e8029d504bc2744c893c485ded1144577603c255f1a4bdc65fef475df0bb2ca2efc29be851f1c9bb06ea66eb666b64186ffa5363aa", 0x4d}, {&(0x7f0000002b40)="c6e1a063cde114b3d96a79ef94019246344f60babbcf3743a69e745a78c9701d35481d123182f7e88bdfa9fd456bd8ac53fa920a3eb17607b1288bf2f5ce0f3571a53662c9160728b4e15158d98d42a79e9f21199efcd81aab9b51aee1fad66d89e179f59d0f682f5c9198f80d58ad780399442050d90cb0142ae5dda44549409581bc351528263520571f299949492dd579567256f0f73445452d78c7532aa1ecd16e2d5a9ff116daae2542670a5f1e97348e193d81ea0d34f277379bf5c39f01042104f0c848321676591f01adcadec3ede5", 0xd3}], 0x2, &(0x7f0000002c80)=[{0x110, 0x10b, 0x6, "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"}, {0x40, 0x8e0dea744292d743, 0x7, "1d542eaca60ce1b3c55eed8184ca01a00e01873ce50398baf8dc2b71217c8cae51b3afac0c20d1b8e14a54c7"}], 0x150}}, {{&(0x7f0000002e00)=@pppoe={0x18, 0x0, {0x1, @dev={[], 0xc0}, 'team_slave_1\x00'}}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000002e80)="7f1be79952d9a3b045f260a2213d629d42b5dcb903f182e7b3fd101121ea6f50b7e648384607de6996735eca737aad35da28a4ada5828f7aba3eccb8a345f6f423c57fe0c819df69a5b6bc0c6e05834748ff2d8640fcbc59acc752c0e67214e7311fd8b6d5d99b315a4902a7e2dbb0cd90af5e9ef9b7af7a9d863d2cd1c3e1a9b624bb", 0x83}, {&(0x7f0000002f40)="0a88f58d71caa5d9209c1beaa939100ca718edcbedf609bb4fb31108aa858341b2e948593e1b97c3d0fab91de983d079af01d2c6a5c4325d47eeec419a2140d0726381a773f93683a096cd1bdb24bc177abc26caa4ef63b6512c6b45aea2669ae3432ae64802e370b9e66b58b8faca35bb7e3c09245bc8b7bd42771799e88b3027a29ed19c7ca154e2fd571b2858e0736629db79157b6aa24b6a1fc367c6cae260", 0xa1}, {&(0x7f0000003000)="7b7b996fd0c9bc347e3ad7aebbd23c437f907c6cefb9034daf1ed4bb7fac5ae6229750ea7cb4edaad3020d759d7bd7a31a330f1c00dc3346d67c196514d218cc1f822a4cc20ec9fe00c624451cabe516e3a98d361676a45d402d5409f9feb254983cee7685ec6dc7b5916915d366cd388b5919a4040d971f33bc6b8a0f712543d9b2b7f65a644d15687b6f8c1008f5212be55abf1d1c90400f787f68c5dd647155c1083bf2530b20b322802e", 0xac}, {&(0x7f00000030c0)="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", 0x1000}], 0x4, &(0x7f0000004100)=[{0x90, 0x84, 0x4, "45a9ea750a2b1e05c3d926c9b3beb4343cbf72ce4d9c99843a783bebbeba98de50ca36fd65dbfc82377c314079cf3872462b891910dcb02997fd592695b15215d41b6c20127a0b8dd3ade2c76fa6cab5ef6ef334c6496310cbdf2aa14d17e477043c25a25188997b60de6c7a9cca59e25a5d7b2dd25e3bb9c24aab"}, {0x88, 0x104, 0x114ab754, "b5c206c3ccb5ea350fe5035e0c492f3af788dc11745e8d5fbe332465abc8d7af5419acf3f051158dd12202df5cf30aee8e71c61ee8b00952f78566ebc10dba720220a6e04b7b7381081cd28f75f9bb5b15a4532d1f425f6ad08043e2469a557db576c6dd2f1cd75d3aeccce4df4416dd7e3e7489"}, {0x10, 0x118, 0x7ff}, {0x98, 0x109, 0x3, "4a43d91add8fca2f39c116709d3146a1865532bb3e452452ae64b2ea141b798d1ed0060eef47466a1871fcbe64aeff4e6b6753a5a54bf415410c34ec74e8c4cdacedab944814318b171f737326e6c0eac637fd3406a00c1f9ca5edc518e9e056202c0aed133585f36cfc4c121533aa9414b69902bc4af9045cd1f3e12262a664e460f75e"}, {0x1010, 0x10e, 0x1000, "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"}, {0x108, 0x101, 0x0, "b1478242d66b5deef43ea0a36747bd82b7b5fde9202e92ccb583637572e4dffdc75c964f3bd89d7503b7f28b4376c3d132fd11de2c94e45f35ceda5518bc719a79bd2160ff51ef4092fc9d95e302fed86e6c41c3bb6ffbf72f641ec44c2ce42826092f23f6eab3a77657629c6c2bcd7ecc710eda20cb63fd742eef181d5eb9c36c148cd51546a073942728a616431bed665573755b11faa0a9e96bb8ba16cd135a293107863db47a3e28f2a14a6327a87ca496c758034d30e105372348541cd24263bbbe7a43d65b1c96906b221952e7a60c10aeb964657f8bd05bb52c3ac401f0d6b14942a2c559eba1104b3938ee6b64"}, {0x1010, 0x113, 0x2, "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"}, {0xc8, 0x220, 0x3f, "9d5801beb572ed199954fed1d7a1bb2a4a69b7263eeab04b2ee1befe93c3c9e00f88d1dd45e48f73568bb8b4e4eb15432d94ef94b9da9ee339a95d6aa40baa0926b3741e01b58b936a4747ebd77e9a1c9480aa62520738d2ef1ae1424fe7657b346e242aaf57d3b7d65e34a2ce47a47f9112198d170a6b26ddf4808663175d3e305e91ab1b0f3098eef823f70678683e67104554db67837011da4e44a51761c3a6e19d21d2359d3c498a709d6915d355c524"}, {0x90, 0x100, 0xfffffffd, "24e2a1c7ae0fb02002efe5245b2d66dba69ae9dcc6a8837c9d01b3785398b5b3693a42403c4d9f5dedb5befbd3a6cea9ff2d6bb5e611232051e2606ddb837d78c9efd4da18f039c4a322c608ed057579afe43b9f005e3a8cf1c2fd185109b6a76d1508d147d2e63dc9c70c63d43acdb1ae5b3cc2e6b904d35302"}], 0x2440}}], 0x3, 0x801) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x28, &(0x7f00000000c0)="7af819aa4c6e2deacb1a82883c49bdfb93bff336db89eb1722ec3d1810440192d60fc59e4b2402eeb56123613883d2c47cae070d4ddac0be24e4bcbf52241ea685412d037c2b02daa2dad0c7df7580012e8f1ad599bfa56bc883a39994ed840ff46cb869425244db3f58094162ce1e08", 0x70) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) write$input_event(0xffffffffffffffff, &(0x7f0000000180)={{}, 0x11, 0x5, 0x9db8}, 0x18) set_robust_list(&(0x7f0000000040)={&(0x7f0000000000), 0x5}, 0x18) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:05 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000000)={{0x7, @name="ebcaa84f93ebf07e8bc48162aab1fc5f55817e016f2348219488cb47b7468f10"}, 0x8, 0x80000000, 0x1}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r3, r5) dup3(r7, r0, 0x0) 07:28:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x7}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 572.884753] input: syz1 as /devices/virtual/input/input165 07:28:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r7, &(0x7f00000003c0), 0x63) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:05 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x96bd60ec3a24d041, 0x86) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() setreuid(r8, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x3f, 0x3, &(0x7f0000000100)=[{&(0x7f00000001c0)="d4fc0f878c8196a490a010bf39c40d887e5dda9d13c9e678ec75cc447d4a326afdd216b9399834fce156f020f49f3a20c15040db925668f59f78556fd8a6ce0348a82b6c74ee09d6355e7ebec4899f7c5418a6b3e1a148160c1c0190dc78dbd7793095c21a705dcbede691b44f6d79a66ae31aa3bb72cbdc804d7fce4be61cb16edb7c1837603e31774e0f3331c46766411a42c9b8b85bd0772e3590f9d722ceb8e68cb7c2c646722457993dd5edc59e980ca0a81f9428fffd74de6f9a4c106025c41cb04b5b10582dfc36679253235761c6ea50c1d039fdb8c89e4dd18b142010c48af31d2fc5379917b116", 0xec, 0x9970}, {&(0x7f00000002c0)="0c429c31bd3383c3868510924c7c2950ed81e3a5f822b1887e0bfa3f63d739b12b0627bd6b95656ab3fc87c35bfb335f0de84b2b9ecae55ef13f4bcdafdc4a294926f201aab225eb6a83340442e14a5523d0e5a9700fdc9078a5e5a08b18f377f7c9888ebe0c0a1cdf3de1dce0c4e61c4f8c43b6a08fb78be94aff971bfab86d9ddd", 0x82, 0x3}, {&(0x7f0000000380)="79daa66cc30254a2e3cf71f69cc86806cd8d748050eca2db96f808ade2af37e81669e47a6a7ce13d4c547f8c28b815149b7ed1576012593162a2e35ebf3897769bf862222721044b471e09663ae20457f0354a301146202d933f00788b91fb8354823b94f8b0715b30285fe80b5b26b0297a1aacf30c1770eb4cfbb6bbe7b4ff6938a9ccbfb786b8e002e1a2447eecfd2c403380eccb6e3d7428f17e50efcfa0a1c099fd7e5292ab5c51d78e5f7792586cbd814b8fd1e6706a37b42c4cb5f013fa922cc54777b2d22dd18b7239dded449b80370d10b9a2c2fac398", 0xdb, 0x8}], 0x100880, &(0x7f0000000580)={[{@fat=@dmask={'dmask', 0x3d, 0x1}}, {@dots='dots'}, {@dots='dots'}, {@fat=@nocase='nocase'}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@appraise='appraise'}, {@dont_hash='dont_hash'}, {@uid_lt={'uid<', r7}}, {@fowner_gt={'fowner>', r8}}]}) 07:28:05 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x3a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f], [0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000880)={"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"}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="24010001", @ANYRES16=0x0, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x20800}, 0x4000800) 07:28:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x10}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 573.481719] input: syz1 as /devices/virtual/input/input167 07:28:06 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r7, &(0x7f00000003c0), 0x63) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) mmap(&(0x7f0000012000/0x1000)=nil, 0x1000, 0x4000001, 0x4010, r1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r3) dup3(r7, r2, 0x0) 07:28:06 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {0x0, 0x0, 0x0, 0x2}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/68}) r2 = semget$private(0x0, 0x7, 0x490d271a6c9ae51f) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000140)=""/206) 07:28:06 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x48}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:06 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 573.941145] input: syz1 as /devices/virtual/input/input169 07:28:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r7, &(0x7f00000003c0), 0x63) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:06 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 574.168602] input: syz1 as /devices/virtual/input/input170 07:28:06 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:06 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x200000) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 07:28:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x1010, r0, 0x8c4c1000) r1 = userfaultfd(0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000100)={{0x2, 0x0, @identifier="e7bd817e62e74e6ad71f03e41bd5e18f"}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) r5 = accept4$llc(r4, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x10, 0x80000) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000200)={'lapb0\x00', 0x800}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r7 = socket(0x2, 0x803, 0xff) r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) setsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r11 = syz_open_procfs(r10, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r11, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r11, 0x84, 0x23, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r11, 0xc058534f, &(0x7f0000000080)={{0x20, 0x7}, 0x0, 0x5, 0x891, {0x6, 0x32}, 0x0, 0x3}) dup3(0xffffffffffffffff, r1, 0x0) 07:28:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x4c}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:07 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = dup(r4) r6 = dup3(r5, r4, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r7, &(0x7f00000003c0), 0x63) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:07 executing program 3: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 574.498311] input: syz1 as /devices/virtual/input/input171 07:28:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0xf, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, r6) setsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x24, &(0x7f0000000180), 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = dup2(r0, r2) dup3(r7, r1, 0x0) 07:28:07 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9d000000000000, 0x200000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000000c0)=""/97) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') recvfrom$llc(r3, &(0x7f0000000140)=""/167, 0xa7, 0x0, &(0x7f0000000200)={0x1a, 0xae6087dd55cbde60, 0x6, 0x80, 0x4, 0xfd, @random="4d246c05804e"}, 0x10) lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) ioctl$UI_SET_KEYBIT(r5, 0x40045565, 0x240) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r6, &(0x7f00000003c0), 0x63) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:07 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = dup(r4) r6 = dup3(r5, r4, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:07 executing program 3: add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x68}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 575.047243] input: syz1 as /devices/virtual/input/input173 07:28:07 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) r5 = dup2(r0, r2) dup3(r5, r1, 0x0) [ 575.149299] input: syz1 as /devices/virtual/input/input174 07:28:07 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = dup(r4) r6 = dup3(r5, r4, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:07 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @broadcast}, {0x0, @random="590b75b9db63"}, 0xd8, {}, 'bond_slave_0\x00'}) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7c20], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{0xc4, 0x5, 0x8000, 0x800}, 'syz1\x00', 0xe}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r6, &(0x7f00000003c0), 0x63) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6c}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:08 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(&(0x7f0000000080)='./bus\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 575.450629] input: syz1 as /devices/virtual/input/input175 07:28:08 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) fcntl$getown(r0, 0x9) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x40000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r4, 0x4008af10, &(0x7f0000000000)={0x1, 0x2}) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = semget$private(0x0, 0x2, 0x530) semctl$GETZCNT(r6, 0x3, 0xf, &(0x7f0000000080)=""/77) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = dup2(r0, r2) dup3(r7, r1, 0x0) 07:28:08 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, 0x0, 0x800) [ 575.738689] input: syz1 as /devices/virtual/input/input177 07:28:08 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x74}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r6, &(0x7f00000003c0), 0x63) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:08 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000040)={0x2, 0x5}) 07:28:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000080)={0xfffe0000, 0x1b, 0x4, 0x0, {r6, r7/1000+10000}, {0x1, 0x0, 0x71, 0xf2, 0xc0, 0x1, "d7270cbe"}, 0x6c, 0x1, @fd=0xffffffffffffffff, 0x4}) r9 = fcntl$dupfd(r3, 0x0, r8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = dup2(r0, r2) dup3(r10, r1, 0x0) [ 575.965077] input: syz1 as /devices/virtual/input/input179 07:28:08 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, 0x0, 0x800) 07:28:08 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 576.086814] input: syz1 as /devices/virtual/input/input180 07:28:08 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {0x7ff, 0x2, 0x80}, 0x2b, [0xfffffff9, 0x7ff, 0x9, 0xfff, 0x3, 0x7, 0x80000001, 0x8, 0x400, 0x6, 0x0, 0x10000, 0x9, 0x6, 0x5, 0x7, 0x6, 0x1ff, 0x871, 0x3, 0x8, 0x1, 0x7, 0x10000, 0x5, 0x6, 0x2, 0x6, 0x5, 0x9, 0x0, 0x1ff, 0x7, 0x4, 0x7, 0x7, 0xfff, 0x2, 0x1, 0x3, 0x4, 0x26d4, 0x200, 0x800, 0xfffffffa, 0x93, 0xd1d, 0x6, 0x4, 0xffff8000, 0x2, 0xfffffff8, 0xfd, 0x3, 0x10001, 0xf2, 0x8, 0x81, 0x6, 0x7, 0x1f, 0x800, 0x3f, 0x4], [0xd8fa, 0x1, 0xfffffffc, 0x1, 0x6, 0x3, 0xf239, 0x900000, 0xffff, 0x3ff, 0x3, 0x5, 0x8, 0x800, 0x80, 0x31, 0x3, 0x3904, 0x9, 0xc8, 0xf0, 0xd6, 0x9, 0x7, 0x8001, 0xfffffe00, 0x7f, 0xffffffff, 0x80, 0x45, 0xff, 0xffff, 0x5, 0xcfc6, 0xf3, 0x40, 0x0, 0x7, 0x7e2, 0x1, 0x7fffffff, 0xc3c, 0x1, 0xab5a, 0x2, 0xb66, 0x2, 0x0, 0x1, 0x20, 0x40, 0x5, 0x7, 0x80, 0xffff, 0x7, 0x5, 0x2c62cedd, 0x9, 0xcf13, 0xff, 0x3, 0x9, 0x4], [0x8, 0x1, 0x5, 0x7fffffff, 0x8, 0x41070477, 0x1000, 0x1f, 0x0, 0x101, 0x3f, 0x3, 0x4, 0x3, 0x5b, 0xfffffffa, 0x1244, 0xffff6f78, 0x0, 0x7ff, 0x49, 0x7, 0x1, 0x7b5, 0x3f, 0x8, 0x6, 0x2, 0x7637478, 0x2, 0x8, 0x5, 0x0, 0x10000, 0x1, 0x9, 0x200, 0x0, 0x100, 0x200, 0xc83, 0x9, 0x8, 0x8000, 0x0, 0x200, 0x6, 0x6, 0x3, 0x8001, 0x6d22, 0x80, 0x4, 0x4, 0x9, 0x6, 0x3, 0x61, 0x0, 0x5, 0xffffffff, 0x5003, 0x10001, 0x10000], [0x8651, 0x8, 0x10001, 0x10000, 0xe7d5, 0xe8, 0xba0, 0x8001, 0xfffffff7, 0x0, 0xffff, 0x4, 0xfffffeff, 0x8, 0x3, 0x3ff, 0x7f, 0x9, 0x7, 0x0, 0x9, 0x0, 0x50d, 0x5, 0xfff, 0x5, 0x9, 0x3ff, 0x4, 0x100, 0x7f, 0x7, 0x8, 0x5, 0x1, 0x7, 0xfffffbff, 0x0, 0x1, 0x10001, 0x3f, 0x4, 0x7ff, 0xff, 0x2, 0x3, 0x7ff, 0x7fff, 0x7, 0x7, 0x4, 0xd5d2, 0x9, 0x20, 0x0, 0x80000000, 0x2, 0x1, 0x9, 0x99, 0xb73, 0x5d0, 0x10001, 0x3ac]}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x1, 0x1, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) 07:28:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x7a}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 576.330689] input: syz0 as /devices/virtual/input/input181 07:28:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r6, &(0x7f00000003c0), 0x63) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:09 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, 0x0, 0x800) 07:28:09 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xe) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000000)=0xef, &(0x7f0000000040)=0x2) fsync(r0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 576.621605] input: syz1 as /devices/virtual/input/input183 07:28:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x3000004, 0x10032, 0xffffffffffffffff, 0x7d44e000) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) 07:28:09 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x300}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r6, &(0x7f00000003c0), 0x63) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:09 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x92802, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e20, 0x6, @remote, 0x6f36656e}, {0xa, 0x4e20, 0x4, @rand_addr="75b8222d7a5f8b5b1ed004d3f9a00356", 0x81}, 0x8, [0x6, 0x7, 0x8, 0x6b95, 0xffffffff, 0x8, 0x800, 0x3]}, 0x5c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 576.970202] input: syz1 as /devices/virtual/input/input185 07:28:09 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r7, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)={[{0x16, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'cpu'}, {0x0, 'cpu'}, {0x2d, 'memory'}, {0x1f, 'pids'}, {0x2b, 'pids'}, {0x2d, 'pids'}, {0x2b, 'rdma'}]}, 0x37) r8 = dup2(r0, r2) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) sync_file_range(r9, 0x7, 0xb0f0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) dup3(r8, r10, 0x0) 07:28:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r6, &(0x7f00000003c0), 0x63) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x500}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 577.106581] input: syz1 as /devices/virtual/input/input186 07:28:09 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:09 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:09 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:10 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 577.414880] input: syz1 as /devices/virtual/input/input187 07:28:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r6, &(0x7f00000003c0), 0x63) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x600}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:10 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 577.543778] input: syz1 as /devices/virtual/input/input188 07:28:10 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x26bd2cb856a79fc, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f00000000c0)={0x1, 0x3, 0x1ff, 0x6a, 0x6, 0xfff}) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, 0x0, 0x0) write$uinput_user_dev(r3, &(0x7f0000000880)={'syz1\x00', {0x6, 0x2, 0x40, 0x1}, 0x43, [0x1, 0xe64, 0x5, 0x100, 0x200, 0x3, 0x9, 0x10001, 0xfff, 0x0, 0xffffffa5, 0x8, 0xfffffff8, 0x7, 0xfffffff9, 0x5, 0x5e0a6ef5, 0x4, 0x5, 0x4, 0x3, 0x8, 0xe24, 0x0, 0xaf, 0x4, 0x7, 0x200, 0xee3, 0xff, 0xfff, 0x4, 0x1ff, 0x7fffffff, 0x3, 0x1000, 0x54a9, 0x7, 0x5, 0x0, 0x9, 0x800, 0xc4, 0xff, 0x10000, 0x401, 0x9, 0x8, 0x4, 0x7, 0x6, 0x4, 0x8001, 0x0, 0x400, 0x8, 0x10000, 0x8d, 0x2, 0xa75, 0x6, 0x20, 0x2], [0x8f2, 0x6c, 0x80000001, 0x200, 0x6, 0x2000000, 0x100, 0xffffffff, 0x2, 0x4d158, 0x5, 0xe0, 0x7, 0x46, 0x9, 0x666, 0x3f, 0xb763, 0x9, 0x4, 0xff, 0x7ff, 0xfffffffc, 0xffff, 0x100, 0x3, 0xf8, 0x1, 0x401, 0x800, 0x7, 0x4, 0x954, 0x1, 0x7fff, 0x2000000, 0x4, 0x1, 0xf62, 0x40, 0xd5de, 0x7fffffff, 0x0, 0x1, 0x8001, 0x3, 0x3, 0x7, 0x6, 0x81, 0x1000, 0x9, 0x7, 0x1, 0x7, 0x7, 0x7dc, 0x20, 0x4, 0x1000, 0x7fffffff, 0x100, 0x0, 0x7976], [0x100, 0x1f, 0x5, 0x8770, 0x5, 0x800, 0x80000001, 0x400, 0x0, 0x3, 0x9, 0x8, 0x4, 0x0, 0x9, 0xe9, 0x7fffffff, 0xffff, 0x2, 0x2, 0x6, 0x3, 0x4, 0xfff, 0x8, 0x6, 0x8001, 0x3, 0x48a, 0x1f, 0xffffffff, 0x1, 0x2, 0x5990, 0x2, 0x9, 0x800, 0x400, 0x7fffffff, 0x80000000, 0x8001, 0x5, 0x0, 0xdb69, 0x0, 0xfffffff8, 0x4, 0x3, 0x4, 0x1, 0xb2, 0x7c356539, 0x7fff, 0x72, 0x0, 0x4, 0x8, 0x3, 0x0, 0x80, 0x80, 0x8, 0x100, 0xfffffffe], [0x1f, 0x1ff, 0x0, 0x0, 0xffffffff, 0x3, 0x7, 0x81, 0x4, 0x3, 0x80000000, 0xc5fa, 0x7ff, 0x6, 0x845, 0x4, 0x80000001, 0x3, 0x3, 0x2ed, 0xff, 0x1d3aa759, 0x7, 0x71ec, 0x9, 0xffffffff, 0x7, 0x4110, 0x4, 0x5, 0xc5, 0x0, 0x7fffffff, 0x80000000, 0x4, 0x10a, 0x157d6c01, 0x7, 0x8000, 0x7fffffff, 0x101, 0xb8ed, 0x200, 0x4, 0x4, 0x9, 0x6, 0x10000, 0x7ff, 0xfffffe00, 0x3, 0x7fffffff, 0x2, 0x2, 0x9, 0x1, 0x0, 0x2, 0x6, 0x401, 0x1000, 0xfffffaec, 0x8, 0x3]}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r4, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e20, 0x9, @ipv4={[], [], @empty}, 0x1}, r5}}, 0x38) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 577.884778] input: syz1 as /devices/virtual/input/input189 07:28:10 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r6, &(0x7f00000003c0), 0x63) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:10 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x700}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x8000) ioctl$KVM_NMI(r1, 0xae9a) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r4, 0x80dc5521, &(0x7f0000000140)=""/39) r5 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) set_thread_area(&(0x7f00000000c0)={0x9, 0x20000000, 0x2000, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1}) setsockopt$CAN_RAW_RECV_OWN_MSGS(r5, 0x65, 0x4, &(0x7f0000000000), 0x4) 07:28:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r7, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r7, 0xc0e85667, &(0x7f0000000080)={0xa0000000, 0x4, "6606ef09ad1457cde2a16e39f6a13afafc7f95a2b7d857af6aa34c713d6e127d", 0x5, 0x9, 0xffffffff, 0xc63, 0x4, 0x4, 0x3, 0x7, [0x8, 0x80000001, 0x40, 0x9c]}) setsockopt$X25_QBITINCL(r7, 0x106, 0x1, &(0x7f00000001c0)=0x1, 0x4) r8 = dup2(r0, r2) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000000)={0x1ed, 0x7, 0x2, @local, 'hsr0\x00'}) dup3(r8, r1, 0x0) [ 578.172264] input: syz1 as /devices/virtual/input/input191 07:28:10 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:10 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 578.305935] input: syz1 as /devices/virtual/input/input192 07:28:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r4, &(0x7f00000003c0), 0x63) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:11 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:11 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x42, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001]}, 0x2b3) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x40800) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000040)={0x2e, 0x6, 0x0, {0x5, 0x1, 0x5, 0x0, 'syz1\x00'}}, 0x2e) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x70e}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:11 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:11 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:11 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa, 0x34}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, r3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value={0x0, 0x64}, &(0x7f0000000280)=0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)={0x14, r7, 0x701, 0x0, 0x0, {0x8, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r5, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYBLOB="98020000", @ANYRES16=r7, @ANYBLOB="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"], 0x298}, 0x1, 0x0, 0x0, 0x80}, 0x800) r8 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20da81, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r8, 0x40045730, &(0x7f0000000080)=0x5) socket(0x0, 0x800, 0x9a) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) r11 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x100000, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x00', 0x1132}) r12 = fcntl$dupfd(r10, 0x0, r9) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = dup2(r0, r2) setsockopt$inet_sctp6_SCTP_INITMSG(r12, 0x84, 0x2, &(0x7f0000000140)={0x2, 0x7ff, 0x4, 0x3ff}, 0x8) dup3(r13, r1, 0x0) 07:28:11 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:11 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r4, &(0x7f00000003c0), 0x63) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xe07}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 578.952896] input: syz1 as /devices/virtual/input/input195 07:28:11 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000240)=@int=0x4cc, 0x4) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xef) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r3) dup3(r7, r2, 0x0) [ 579.066380] input: syz1 as /devices/virtual/input/input196 07:28:11 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x3) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:11 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x37, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:12 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r4, &(0x7f00000003c0), 0x63) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x1f00}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x3, &(0x7f0000000280)=[{&(0x7f00000000c0)="4e0aed5a2b8f4029f693f0058c65908dd09c65204615979a335bac", 0x1b, 0x7}, {&(0x7f0000000100)="0d1d31758d210d17f9068f68da71e068eb72292bea3585d35093f72f99e06a7e3855bda2c99217f7fc", 0x29, 0x9b}, {&(0x7f00000001c0)="3483a32fd8ace9a8778c1b495429f725469890c3d9d0638bb8992f1be1424bf73c6356b29851ed84fa433173dfba3962423dc2c6ca0f285d64875e2e1cec9ff4a3a22388665d659a407e29c9c7f1dd18d154e8f1143b9f2c03d89216eb3eebbceeb003d182b9e15b875535cd189dae2e311af6b1f1478045c9e890d560bb844ebbcbc68c514152e3988b60f9314b", 0x8e, 0x401}], 0x24, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r5, 0x40405514, &(0x7f0000000140)={0x4, 0x0, 0x8, 0xd566, 'syz1\x00', 0x6b7}) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) 07:28:12 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x37, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:12 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {0x2}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x10], [0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10, 0xc0000) setsockopt$sock_int(r1, 0x1, 0x1, &(0x7f0000000140)=0x5f, 0x4) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0xe795, &(0x7f0000ffc000/0x2000)=nil, 0x1) 07:28:12 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 579.645276] input: syz1 as /devices/virtual/input/input201 07:28:12 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x37, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) accept4$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r5, &(0x7f00000003c0), 0x63) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x103fc, 0x1, 0x0, 0x2000, &(0x7f0000011000/0x2000)=nil}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) [ 579.837125] input: syz1 as /devices/virtual/input/input202 07:28:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x2000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:12 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x53, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:12 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:12 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {0x0, 0x0, 0x0, 0x3}, 0x0, [0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0xb691, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x101000) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r2, 0x400, 0x0) close(r2) sendmsg$can_raw(r2, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x1, 0x1}, 0x16, 0x3, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000440)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e22, 0x10001, @mcast1, 0x519}}}, 0x84) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0x10, 0x7f, 0x2}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r6, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, 0x0, 0x0) write$uinput_user_dev(r6, &(0x7f0000000880)={'syz1\x00', {0x8, 0x6, 0xfff, 0x1000}, 0x1f, [0xb8, 0x6, 0xfffff000, 0xef1b, 0x8, 0x4, 0x6, 0x1, 0xfbf, 0xf4, 0x3, 0x1, 0x3, 0x5, 0x4, 0x80000000, 0xfff, 0x1, 0x8, 0x8, 0x81, 0x3, 0x3, 0x7, 0x1, 0x40, 0x5, 0x3, 0xff3e, 0x5, 0x5, 0x4, 0x5, 0x2, 0x8, 0x7, 0x0, 0x9, 0x1, 0x6, 0x5d7, 0x7fffffff, 0x9, 0x6, 0x40, 0x7, 0x7, 0x1000000, 0x400, 0x20, 0xffff, 0x9, 0x9, 0x81, 0xbc, 0xfffffff8, 0xfffffffa, 0xc3, 0x9, 0x545b, 0x20, 0x1, 0x0, 0x7], [0xffff, 0x800, 0x80000000, 0x401, 0x62, 0x1, 0x0, 0x6, 0x8, 0x2, 0x3, 0x80000001, 0xfff, 0x612b, 0x0, 0x8eb, 0x40, 0x6, 0x3, 0x4, 0x7f80000, 0x80000000, 0x8000, 0x1, 0x7, 0x4, 0x7f, 0x6, 0xec9, 0xfffffffd, 0xb6, 0x8001, 0xe2, 0x8, 0x20, 0xffff, 0x3ff, 0x4, 0x3, 0x7, 0x5166, 0xffffffff, 0x6, 0x8, 0x49f, 0x170f, 0x7, 0x80000001, 0x2, 0xffffffff, 0x8, 0x3, 0xfff, 0x1, 0x8, 0xa30e, 0x10001, 0xfff, 0x6, 0x73bb, 0xffffffdf, 0x4, 0x816, 0x7fffffff], [0x5, 0x80000001, 0x9, 0x1, 0x3f92, 0x4000000, 0x1ab3, 0x80000000, 0x0, 0x1f, 0x80, 0x7, 0x8, 0x80, 0x4, 0x5, 0x9, 0x4, 0x0, 0x0, 0x8000, 0x7, 0x290b95fb, 0x4, 0x93b4, 0x3, 0x0, 0x1f, 0x1, 0x4, 0x2548, 0x9, 0x7f, 0xbd7f, 0x401, 0x21ada6c5, 0x4, 0x0, 0x100, 0x1, 0x9, 0x49d, 0x4967, 0x0, 0x5, 0x9, 0x7, 0xebf, 0x7, 0x0, 0x0, 0x545, 0x8000, 0x7fffffff, 0x9, 0x0, 0x0, 0x6c6, 0xfffffb4b, 0x3f, 0x4, 0x9, 0xa9e0, 0x1], [0x5, 0x1, 0x1000000, 0x6, 0xfffffff7, 0x39, 0x0, 0x0, 0x80000000, 0x6d, 0x5, 0xfffffffa, 0x200, 0x101, 0x3, 0xc664, 0x80000000, 0x1000, 0x4, 0x3ff, 0x7ff, 0x3ff, 0x7ff, 0x9, 0x5, 0x7, 0x5, 0x2, 0x0, 0x7, 0x3f, 0x2, 0x200, 0x3f, 0x7, 0x7e4, 0xfffff692, 0x1ff, 0x101, 0x8, 0x2, 0x4c3, 0x1ff, 0x1, 0x1, 0xfaa, 0x8, 0x2, 0x0, 0x2, 0x473898bf, 0x4, 0xffff, 0x684, 0x80, 0xe9ad, 0x8, 0x81, 0x7, 0x2, 0x401, 0x5893, 0x9, 0x4]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r2) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r9 = syz_open_procfs(r8, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r9, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r9, 0x84, 0x23, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r9, 0xc0205649, &(0x7f00000001c0)={0x0, 0x1, 0x5, [], &(0x7f0000000140)={0x6b1480bb1aadec67, 0x0, [], @string=&(0x7f0000000100)=0x7f}}) dup3(r7, r1, 0x0) 07:28:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) accept4$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r5, &(0x7f00000003c0), 0x63) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:12 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x53, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 580.305044] input: syz1 as /devices/virtual/input/input203 07:28:13 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x3f00}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:13 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x53, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 580.493006] input: syz1 as /devices/virtual/input/input204 07:28:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80400) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) bind$alg(r3, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r2) dup3(r7, r1, 0x0) 07:28:13 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) 07:28:13 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) accept4$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r5, &(0x7f00000003c0), 0x63) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:13 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:13 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xe) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200000, 0x0) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x40) connect$llc(r4, &(0x7f0000000100)={0x1a, 0x3, 0x20, 0x40, 0x0, 0x8b, @random="6996ed93c8cd"}, 0x10) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000040)={0x7, 0xff, 0x7c, 0x57f9, 0x401}) 07:28:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x4000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:13 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 581.028542] input: syz1 as /devices/virtual/input/input207 07:28:13 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x8, 0x5, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) r7 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000000c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x24) r8 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4000007, 0x109800) bind$x25(r8, &(0x7f00000002c0)={0x9, @remote={[], 0x3}}, 0x12) close(r0) 07:28:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) accept4$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r4, &(0x7f00000003c0), 0x63) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 581.268163] input: syz1 as /devices/virtual/input/input208 07:28:14 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:14 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:14 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x67, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f0000000000)=0x1ff) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) accept4$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r4, &(0x7f00000003c0), 0x63) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:14 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x0, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x4800}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 581.611690] input: syz1 as /devices/virtual/input/input209 07:28:14 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x67, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0xaa53, 0x8000, 0x7ff, 0x3f}, &(0x7f0000000080)=0x10) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r4, 0x400, 0x0) close(r4) sendmsg$can_raw(r4, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x0, 0x1}, 0x16, 0x0, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000440)={r6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={r6, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001b00)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x4, 0x3, 0x10000, 0x7}, &(0x7f0000001bc0)=0x98) sendmsg$inet_sctp(r3, &(0x7f0000001d40)={&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x3cc94538, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9b3}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000740)="e36a4958a4caec1c14798c9fad47c1884484e60784467a4109adfa222d385e640f2eea59362320cf678396894e92c816d076b1d99e069adae01350ccea8608e962300d7bc96efcff179a4079520992599985ea67e8ffe25123ff0f003c7ed0f1d65396e99aaccb0848916acf92518d0c493886055e9863bfe345b42503805389e5afbd1f7d94a760bb0d3ecbe23f0f875f6d0fcec265a59cb79892e91176d583f72d75832886424b9464f6074108b157306fffbca0f1506660abb2569c669e11ed2ae38fe131c2f36369febdde81072a554ca05279bbefc9fcc6d417c59e27fa20d9504b6310", 0xe6}, {&(0x7f00000008c0)="76f5615c727abd9b0e673d8a54e87dc33296c5c7c69bfc0f58cadd620f2d7cb89eeedf998c9ea4094dddbf29d311fabbadff22bd1c08da3e51e83fdd2a3db156c70d8890d41c645fd0f38b0dec0237b8beb2fe4f896342a3f2809721508098986b0bbce1820036aac4264f216442c4cda44dcd8c13fc095f52dc6c08531a8a7ff036e1d408c563fe4214e24cbe0f0bb3904e64150956338505288ac17adf25632f838bd3dfd5319dc9319ab1e67cae31281b63a12a01975e2b1a5e4eeb7b01", 0xbf}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="0acc897be9ee424370b63b056a3b4c586f8c059404251e7c337befbf0bb106776306852d83d47721a217d0c92cb9e8f14ce906bf3b33245466ce7cfe7e8e84b472a44f941a57983478e2606582a83f250d341e65838a832bd230809549461209c7a1eaf0bf", 0x65}, {&(0x7f0000001a00)="84f4e2ba2eb8631dc3c67837e21a8d94cee631ec5b00b0a9b4f1234898c5feecd86e528b43794ecdbfadfa222e88e3e7b11bc4b58dd3c4b91156b5a4741bc3e6a37afe468cc8347b9103ae6eaa378647c03d3e14b1d3a3927c4deefe271dc902b4c6b08e67e7c714a47509", 0x6b}], 0x5, &(0x7f0000001c00)=[@sndrcv={0x30, 0x84, 0x1, {0x7, 0x2, 0x8000, 0x4df, 0x80, 0x79, 0x1, 0x5, r6}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xffff, 0xa, 0x5, 0x0, 0x3, 0x6, 0x8, r7}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xfffffff8}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x3, 0x1f, 0x7f}}], 0x128, 0x1}, 0x40000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f00000000c0)=@assoc_value={r6, 0x80000000}, &(0x7f0000002000)=0x8) r8 = socket(0x2, 0x803, 0xff) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = dup2(r0, r2) dup3(r11, r1, 0x0) 07:28:14 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x0, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) accept4$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r4, &(0x7f00000003c0), 0x63) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:14 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r1, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, 0x0, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000100)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x3f, 0x2]}, 0x45c) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x1f3) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x9}, 0xc) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffff, 0x500) ioctl$VIDIOC_STREAMON(r3, 0x40045612, &(0x7f00000000c0)) 07:28:14 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x67, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:14 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x0, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x4c00}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 582.049208] input: syz1 as /devices/virtual/input/input211 07:28:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0xe, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0xf, 0x0, &(0x7f0000000180)) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="754d2c0ee11abee35d9c"], 0x0, 0xa}, 0x20) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xc8d}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x400, @mcast1, 0x10000}, @in6={0xa, 0x4e24, 0x9cf, @loopback, 0x5}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2b}}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x101, @mcast1}], 0x74) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0x0, 0x80000, 0xffffffffffffffff, 0x0) read(r5, &(0x7f00000000c0)=""/4096, 0x1000) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r8 = socket(0x2, 0x803, 0xff) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000001140)={0x0, 0x1, 0x81}) fcntl$dupfd(r8, 0x0, r9) setsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x24, &(0x7f0000000180), 0x20000188) keyctl$get_persistent(0x10, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000010c0)={'syz', 0x0}, &(0x7f0000001100)="969ee270b8184de8650a57e6d0b87b4f12c2", 0x12, 0xfffffffffffffffd) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) 07:28:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 07:28:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) accept4$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r3, &(0x7f00000003c0), 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:14 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6b, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 582.324084] input: syz1 as /devices/virtual/input/input213 07:28:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6800}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:15 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:15 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6b, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 582.469619] input: syz1 as /devices/virtual/input/input214 07:28:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000040)={0x3}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) accept4$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r3, &(0x7f00000003c0), 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:15 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6b, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:15 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 582.745136] input: syz1 as /devices/virtual/input/input215 07:28:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6c00}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 582.837041] input: syz1 as /devices/virtual/input/input216 07:28:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) 07:28:15 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:15 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) accept4$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r3, &(0x7f00000003c0), 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:15 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x64, &(0x7f0000000000)=0x2, 0x4) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 583.201858] input: syz1 as /devices/virtual/input/input217 07:28:15 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x7400}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:15 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r7 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r7, 0x400, 0x0) close(r7) sendmsg$can_raw(r7, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x0, 0x1}, 0x16, 0x0, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r8, 0x84, 0xe, &(0x7f0000000440)={r9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000280)={r9, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001b00)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x4, 0x3, 0x10000, 0x7}, &(0x7f0000001bc0)=0x98) sendmsg$inet_sctp(r6, &(0x7f0000001d40)={&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x3cc94538, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9b3}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000740)="e36a4958a4caec1c14798c9fad47c1884484e60784467a4109adfa222d385e640f2eea59362320cf678396894e92c816d076b1d99e069adae01350ccea8608e962300d7bc96efcff179a4079520992599985ea67e8ffe25123ff0f003c7ed0f1d65396e99aaccb0848916acf92518d0c493886055e9863bfe345b42503805389e5afbd1f7d94a760bb0d3ecbe23f0f875f6d0fcec265a59cb79892e91176d583f72d75832886424b9464f6074108b157306fffbca0f1506660abb2569c669e11ed2ae38fe131c2f36369febdde81072a554ca05279bbefc9fcc6d417c59e27fa20d9504b6310", 0xe6}, {&(0x7f00000008c0)="76f5615c727abd9b0e673d8a54e87dc33296c5c7c69bfc0f58cadd620f2d7cb89eeedf998c9ea4094dddbf29d311fabbadff22bd1c08da3e51e83fdd2a3db156c70d8890d41c645fd0f38b0dec0237b8beb2fe4f896342a3f2809721508098986b0bbce1820036aac4264f216442c4cda44dcd8c13fc095f52dc6c08531a8a7ff036e1d408c563fe4214e24cbe0f0bb3904e64150956338505288ac17adf25632f838bd3dfd5319dc9319ab1e67cae31281b63a12a01975e2b1a5e4eeb7b01", 0xbf}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="0acc897be9ee424370b63b056a3b4c586f8c059404251e7c337befbf0bb106776306852d83d47721a217d0c92cb9e8f14ce906bf3b33245466ce7cfe7e8e84b472a44f941a57983478e2606582a83f250d341e65838a832bd230809549461209c7a1eaf0bf", 0x65}, {&(0x7f0000001a00)="84f4e2ba2eb8631dc3c67837e21a8d94cee631ec5b00b0a9b4f1234898c5feecd86e528b43794ecdbfadfa222e88e3e7b11bc4b58dd3c4b91156b5a4741bc3e6a37afe468cc8347b9103ae6eaa378647c03d3e14b1d3a3927c4deefe271dc902b4c6b08e67e7c714a47509", 0x6b}], 0x5, &(0x7f0000001c00)=[@sndrcv={0x30, 0x84, 0x1, {0x9, 0x2, 0x8000, 0x4df, 0x80, 0x79, 0x1, 0x5, r9}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xffff, 0xa, 0x5, 0x0, 0x3, 0x6, 0x8, r10}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xfffffff8}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x3, 0x1f, 0x7f}}], 0x128, 0x1}, 0x40000) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180)={r9}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r11 = dup2(r0, r2) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) close(r12) dup3(r11, r1, 0x0) 07:28:16 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xf, 0x0, &(0x7f0000000180)) r2 = dup2(0xffffffffffffffff, r1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) ioctl$PPPIOCDISCONN(r4, 0x7439) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0xf, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, r5) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) ioctl$BLKROGET(r4, 0x125e, &(0x7f0000000200)) ioctl$sock_SIOCGIFBR(r5, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000040)='rose0\x00'}) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000000)={0x77359400}, 0x10) r6 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r6) 07:28:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) accept4$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r3, &(0x7f00000003c0), 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:16 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 583.536668] input: syz1 as /devices/virtual/input/input219 07:28:16 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:16 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 583.711647] input: syz1 as /devices/virtual/input/input220 07:28:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x7a00}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) accept4$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r3, &(0x7f00000003c0), 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value={0x0}, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f00000000c0)={0x3, 0x7, 0x7ff, 0x1, 0x1}) r7 = dup2(r0, r2) dup3(r7, r1, 0x0) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0xf, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, r8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r8, 0x84, 0x1a, &(0x7f0000000100)={r3, 0x75, "1830ce71b7681fb6100757460b33c4739be1bdafb0607559e765fdd2f22140eed06131e7fcb34a96346c1bccd05ec9f4322ea7489a422d6faf3ff0be13d457efad4aacd405b6890c668f793d279cc125d1c1074ec5474532cd9ad4acf9360a9835ca0f8ef7441c9243456d9c9a43c3f36f0fd77ce7"}, &(0x7f00000001c0)=0x7d) 07:28:16 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:16 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc0000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:16 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) accept4$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r3, &(0x7f00000003c0), 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 584.093441] input: syz1 as /devices/virtual/input/input221 07:28:16 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xedc0}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 584.195273] input: syz1 as /devices/virtual/input/input222 07:28:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200c00, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r8 = dup2(r0, r7) dup3(r8, r1, 0x0) 07:28:16 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:17 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/882], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x975]}, 0x45c) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) accept4$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x10, 0x800) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r1, 0x203ffffd, 0x0) accept4$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r2, &(0x7f00000003c0), 0x63) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 584.512000] input: syz1 as /devices/virtual/input/input223 07:28:17 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/882], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:17 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r0, 0x203ffffd, 0x0) accept4$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0), 0x63) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 584.639771] input: syz1 as /devices/virtual/input/input224 07:28:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x20000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x40010, r1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket(0x2, 0x803, 0xff) prctl$PR_GET_KEEPCAPS(0x7) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r3) dup3(r7, r2, 0x0) 07:28:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f00000000c0)) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x14) lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000000)={{0x2, 0xf3, 0x9, 0x1ff}, 'syz1\x00', 0x57}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:17 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/882], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:17 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r0, 0x203ffffd, 0x0) accept4$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0), 0x63) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:17 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 584.944837] input: syz1 as /devices/virtual/input/input225 07:28:17 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/884], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) socket(0x2, 0x803, 0xff) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = dup2(r0, r2) dup3(r3, r1, 0x0) 07:28:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0xf3a, 0x1, 0x10, &(0x7f0000fff000/0x1000)=nil, 0x40}) 07:28:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r0, 0x203ffffd, 0x0) accept4$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0), 0x63) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:17 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/884], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6b6b6b}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:17 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}}, 0x800) 07:28:18 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/884], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 585.330537] input: syz1 as /devices/virtual/input/input227 07:28:18 executing program 1: r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x203ffffd, 0x0) accept4$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0), 0x63) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) recvmsg(r4, &(0x7f0000001680)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/218, 0xda}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/244, 0xf4}, {&(0x7f0000000000)=""/9, 0x9}, {&(0x7f00000014c0)=""/149, 0x95}, {&(0x7f0000000100)=""/125, 0x7d}, {&(0x7f00000002c0)=""/57, 0x39}, {&(0x7f0000001580)=""/91, 0x5b}], 0x8, &(0x7f0000000440)=""/64, 0x40}, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r6 = socket(0x2, 0x803, 0xff) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = dup2(r0, r2) dup3(r9, r1, 0x0) [ 585.466044] input: syz1 as /devices/virtual/input/input228 07:28:18 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:18 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000b80)={0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x6, &(0x7f0000000980)=[{&(0x7f00000000c0)="393620e94de7beab9caeb18f33ce70a499b80c4d8a4a6a9af0fe4e82584cfc9d5b082cc8d98fd9b39677fdfc5eda6334521930ba074ae7565d0c9be25953da4151b4109981f2894349090d5b3e8b91a451c75b58cde34de62d95d9e93e19330abdfdf3c2f633cfe0203d1045396c4c082433383875ea300ff985ef49e8fa60614f257bdda74120f2c2459747d4ec17433ec15c1189ce085b046db1966dc09ef242f9b1603e1d7798e623a57af5e85943c6f592611c2d869f8a17842c89aba43f2723cdb8e378c9976fe223b4aeea7c37140ed400f409c15aa8a59c547d5f94f9", 0xe0, 0x4bdb}, {&(0x7f00000001c0)="fbae0e96477d2ee50cbd875a7b639ee77d5bfcef74612acd77f44d329d928a126b4d5deb2b462869f8d41c56b788296d4b9fc20ac33df33f2e367120bfff7f9d1a66843fea1609753351dc29e9423d53d66ece4f7eb533d3a2deb0bc94830f44221850a44ce3d2fcee39c05546e05fadfa53e2f23f9f131448a7ffa5919292234f93ae0e361e3ed9ec28ef0662b36ddc4ad3eb7ab76029b5d7a7f2139761bef834e8ddd00d7e5d21fd3d6db7a896004f2e430f526102296cb3c9ad829e60466d1ead1df65fa15a0477912c5ab08ae011b2f4ce668430aa3378766c9878b68e6f03b7d63563642e87f759ee87b0e7df44a0aae20993", 0xf5, 0x3072}, {&(0x7f00000002c0)="58f1b3a8b75946a0c9645c0abfa626113db29b4fda9b4d54c9c5fbbab6536ddca23deb1045ee30d0ef8b898cb5f858b3e86957442b6e94b5369700b62807123e53d1ab6e9492af80b265dad4f8dcdaebedaf2c71203399d817edb8112ffb836f61fdd5e1c0fb9b461bbea628b41ab8a507281731de8303bb49d5f86bf1f591eee0c8c4868cf8ab609e9312999690e1147b9b904c693f4a07b37b02a39d", 0x9d, 0xff}, {&(0x7f0000000880)="90e3bc218f4971a4fca05287c21f21c18ef7a3efc7b000b2a35b8dbad4b4a3295d813a961793b0333a2fac37e127b45c951dfbab600d7aed9b254b1e40d78bb869e2a863a67b91fea5d857fe17378589e00c2f397ae149f67f27188dc2264754be157e7bfc8efa23e3280a1890a6eab00ba6dfe6dcf4f1e34ca106260cde16d02daf71f74c9b44cdd899664ee12b3769bce8b4685520fb981c0d62d3e58e59394394aa3f585a5fcea467bcb366a51c3727d8adaa6614c648d1d69afc4574ef4f18a5969f473474cee201ca5dec4943ebc9", 0xd1, 0x6}, {&(0x7f0000000380)="2d23f36513437807ecfc90662caff41b62dc8da3d387c47f37d99710b4d198162dfc7bffda7a6273b57e588fa5ebe5da2d87d90973b5d600a533c26dde23", 0x3e, 0x100000000}, {&(0x7f00000003c0)="f3be", 0x2, 0x7}], 0x2000, &(0x7f0000000a40)='syz1\x00') ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000a80)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000b40)={0x0, 0xffffffffffffffff, 0x4, 0x5, 0x7, 0x1}) getsockopt$inet_mreqsrc(r3, 0x0, 0x1a, &(0x7f0000000ac0)={@initdev, @multicast1, @remote}, &(0x7f0000000b00)=0xc) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:18 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}}, 0x800) 07:28:18 executing program 1: r0 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) accept4$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0), 0x63) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x1000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x3000005, 0x10, r0, 0x3000) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r5, 0x89e7, &(0x7f0000000080)={0x6f}) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) inotify_init() r7 = fcntl$dupfd(r3, 0x0, r6) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = dup2(r0, r2) dup3(r8, r1, 0x0) 07:28:18 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 585.820943] input: syz1 as /devices/virtual/input/input229 07:28:18 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}}, 0x800) 07:28:18 executing program 1: r0 = syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r1, &(0x7f00000003c0), 0x63) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:18 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:18 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r1, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x80001f) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x44100, 0x0) read$FUSE(r2, &(0x7f0000000880), 0x1000) 07:28:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x200000, 0x0) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f00000000c0)=0x2897bea3, 0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xf, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, r4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r6, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r6, 0x227d, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value={0x0, 0x7fffffff}, &(0x7f0000002000)=0x8) r7 = socket(0x2, 0x803, 0xff) r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x404240, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = dup2(r0, r3) dup3(r10, r2, 0x0) 07:28:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x2000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:18 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r0, &(0x7f00000003c0), 0x63) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:18 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:18 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 07:28:19 executing program 5: r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000200)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000240)=0x10, 0x40800) dup(r0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x352a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x180000000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f00000001c0)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x84000) r6 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r6, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, 0x0, 0x0) ioctl$PPPIOCATTCHAN(r6, 0x40047438, &(0x7f0000000000)=0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x400) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$apparmor_exec(r8, &(0x7f00000002c0)=ANY=[@ANYBLOB="730061636b205b65742f6970365f6d78917b5fe32a38c7696600"], 0x15) r9 = syz_open_procfs(r7, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r9, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r9, 0x84, 0x23, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r11 = syz_open_procfs(r10, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r11, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r11, 0x84, 0x23, 0x0, 0x0) bind$rxrpc(r11, &(0x7f0000000280)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0x4, @empty, 0xda89}}, 0x24) connect$llc(r9, &(0x7f0000000140)={0x1a, 0x322, 0x20, 0x1f, 0x3f, 0x6, @dev={[], 0xb}}, 0x10) 07:28:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x600, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000080), 0x4) [ 586.437406] input: syz1 as /devices/virtual/input/input231 07:28:19 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:19 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 586.492050] audit: type=1400 audit(1574494099.135:107): avc: denied { map } for pid=30594 comm="syz-executor.5" path="/selinux/commit_pending_bools" dev="selinuxfs" ino=11 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 07:28:19 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r0, &(0x7f00000003c0), 0x63) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 586.627765] input: syz1 as /devices/virtual/input/input232 07:28:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x3000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:19 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:19 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000000)=0x1) 07:28:19 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x1800) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r0, &(0x7f00000003c0), 0x63) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x180000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYSTD(r4, 0x8008563f, &(0x7f0000000080)) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r2) dup3(r7, r1, 0x0) 07:28:19 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 07:28:19 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 587.006469] input: syz1 as /devices/virtual/input/input233 07:28:19 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x1800) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r0, &(0x7f00000003c0), 0x63) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:19 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x4000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) accept4$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r3, &(0x7f00000003c0), 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 587.171138] input: syz1 as /devices/virtual/input/input234 07:28:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @remote}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r3, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_IFINDEX={0x8, 0xb, r7}]}, 0x24}, 0x1, 0x0, 0x0, 0x40021}, 0x48810) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r8 = userfaultfd(0x0) ioctl$UFFDIO_API(r8, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r8, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r9, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r10 = socket(0x2, 0x803, 0xff) r11 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) setsockopt$inet_sctp6_SCTP_CONTEXT(r9, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000000)=0x8, 0x4) r13 = dup2(r0, r9) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000080)={0x0, @aes128}) dup3(r13, r8, 0x0) 07:28:20 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:20 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r0, &(0x7f00000003c0), 0x63) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:20 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000040)={0x2, 0x26, 0x1}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x9) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xffff, 0x7d7a}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x0, &(0x7f0000000140)}, &(0x7f00000001c0)=0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:20 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:28:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x5000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 587.542134] input: syz1 as /devices/virtual/input/input235 07:28:20 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) writev(r0, &(0x7f00000003c0), 0x63) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:20 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:28:20 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x6]}, 0x45c) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$vnet(r1, &(0x7f00000002c0)={0x1, {&(0x7f00000000c0)=""/212, 0xd4, &(0x7f00000001c0)=""/229, 0x2, 0x9ffe81ddfc227e75}}, 0x68) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sendto(r2, &(0x7f0000000240)="7dae6b98a2862f5b2a9794ec45297d91aa4af93ec72652f303967d3d9a33f3df7ee864db6e7ef44b38eb7415acb70fdcd23bcb2a9fee04e232b58a9d30223351e383b91d0e717b0e7a133d9d1e8c4644543bff6eaefbe1015df7ac9cd526987c41e43ec0c38a0fbf0483486ed9b108acccc946b781b4d16c44bdcc651ebba486f4685bf3692a1611668a6903f509f952d641b97a1cfc225a131d5a6ba9ae7a7c3aac10d44d81ae370f0977d918908f0a", 0xb0, 0x10000, 0x0, 0x0) r7 = syz_open_procfs(r6, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r7, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r9 = syz_open_procfs(r8, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r9, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r9, 0x84, 0x23, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r9, 0x4008ae9c, &(0x7f0000000100)={0x18, 0x3, 0x3}) sendto(r7, &(0x7f0000000100), 0x0, 0x10, &(0x7f00000001c0)=@sco={0x1f, {0x7a, 0x7, 0x1, 0x80, 0x7}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r11 = syz_open_procfs(r10, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r11, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r11, 0x84, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r11, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x4, 0x0, 0x0, 0x5, 0x0, 0xd1fb, 0xa400, 0xe4d9af191ce92faa, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x32, 0x81, 0x200, 0x1, 0x20, 0xfffffffd, 0x48}) r12 = dup2(r0, r2) dup3(r12, r1, 0x0) 07:28:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) accept4$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r3, &(0x7f00000003c0), 0x63) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:20 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:28:20 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0), 0x63) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 587.959081] input: syz1 as /devices/virtual/input/input237 07:28:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 588.095039] input: syz1 as /devices/virtual/input/input238 07:28:20 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000040)={0x2, 0x26, 0x1}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x9) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xffff, 0x7d7a}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x0, &(0x7f0000000140)}, &(0x7f00000001c0)=0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:20 executing program 5: r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x80000000, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r1, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) write$binfmt_script(r1, &(0x7f00000009c0)=ANY=[], 0x378) sendto$inet(r1, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x114, 0x11, 0x0, 0x27) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000100)=0x2, 0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc]}, 0x45c) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x10000) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000040)=0x1000) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) 07:28:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x71) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r3) dup3(r7, r1, 0x0) 07:28:20 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:21 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:21 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 588.400788] input: syz1 as /devices/virtual/input/input240 [ 588.429695] input: syz1 as /devices/virtual/input/input239 07:28:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x7000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:21 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:21 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80400) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) bind$alg(r3, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r2) dup3(r7, r1, 0x0) 07:28:21 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 588.707965] input: syz1 as /devices/virtual/input/input241 07:28:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x1000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fcntl$dupfd(r3, 0x0, r4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40902, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = dup2(r0, r2) dup3(r5, r1, 0x0) 07:28:21 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, 0x40) 07:28:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r4, &(0x7f00000003c0), 0x63) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:21 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:21 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x70e0000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000000)=0xa, 0x4) r5 = socket(0x2, 0x803, 0xff) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = dup2(r0, r2) dup3(r8, r1, 0x0) 07:28:21 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, 0x40) [ 589.087022] input: syz1 as /devices/virtual/input/input243 07:28:21 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:21 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, 0x40) [ 589.238170] input: syz1 as /devices/virtual/input/input244 07:28:22 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x8]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x10000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r7, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)={[{0x16, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'cpu'}, {0x0, 'cpu'}, {0x2d, 'memory'}, {0x1f, 'pids'}, {0x2b, 'pids'}, {0x2d, 'pids'}, {0x2b, 'rdma'}]}, 0x37) r8 = dup2(r0, r2) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) sync_file_range(r9, 0x7, 0xb0f0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) dup3(r8, r10, 0x0) 07:28:22 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 589.443399] input: syz1 as /devices/virtual/input/input245 07:28:22 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xdc}, 0x40) [ 589.524970] input: syz1 as /devices/virtual/input/input246 07:28:22 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r4, 0x400, 0x0) close(r4) sendmsg$can_raw(r4, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x0, 0x1}, 0x16, 0x0, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000440)={r6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={r6, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001b00)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x4, 0x3, 0x10000, 0x7}, &(0x7f0000001bc0)=0x98) sendmsg$inet_sctp(r3, &(0x7f0000001d40)={&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x3cc94538, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9b3}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000740)="e36a4958a4caec1c14798c9fad47c1884484e60784467a4109adfa222d385e640f2eea59362320cf678396894e92c816d076b1d99e069adae01350ccea8608e962300d7bc96efcff179a4079520992599985ea67e8ffe25123ff0f003c7ed0f1d65396e99aaccb0848916acf92518d0c493886055e9863bfe345b42503805389e5afbd1f7d94a760bb0d3ecbe23f0f875f6d0fcec265a59cb79892e91176d583f72d75832886424b9464f6074108b157306fffbca0f1506660abb2569c669e11ed2ae38fe131c2f36369febdde81072a554ca05279bbefc9fcc6d417c59e27fa20d9504b6310", 0xe6}, {&(0x7f00000008c0)="76f5615c727abd9b0e673d8a54e87dc33296c5c7c69bfc0f58cadd620f2d7cb89eeedf998c9ea4094dddbf29d311fabbadff22bd1c08da3e51e83fdd2a3db156c70d8890d41c645fd0f38b0dec0237b8beb2fe4f896342a3f2809721508098986b0bbce1820036aac4264f216442c4cda44dcd8c13fc095f52dc6c08531a8a7ff036e1d408c563fe4214e24cbe0f0bb3904e64150956338505288ac17adf25632f838bd3dfd5319dc9319ab1e67cae31281b63a12a01975e2b1a5e4eeb7b01", 0xbf}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="0acc897be9ee424370b63b056a3b4c586f8c059404251e7c337befbf0bb106776306852d83d47721a217d0c92cb9e8f14ce906bf3b33245466ce7cfe7e8e84b472a44f941a57983478e2606582a83f250d341e65838a832bd230809549461209c7a1eaf0bf", 0x65}, {&(0x7f0000001a00)="84f4e2ba2eb8631dc3c67837e21a8d94cee631ec5b00b0a9b4f1234898c5feecd86e528b43794ecdbfadfa222e88e3e7b11bc4b58dd3c4b91156b5a4741bc3e6a37afe468cc8347b9103ae6eaa378647c03d3e14b1d3a3927c4deefe271dc902b4c6b08e67e7c714a47509", 0x6b}], 0x5, &(0x7f0000001c00)=[@sndrcv={0xfffffffffffffd49, 0x84, 0x1, {0x7, 0x2, 0x8000, 0x4df, 0x80, 0x79, 0x1, 0x5, r6}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xffff, 0x100, 0x5, 0x0, 0x3, 0x6, 0x6, r7}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xfffffff8}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x3, 0x1f, 0x7f}}], 0x128, 0x1}, 0x40000) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r9 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r9, 0x400, 0x0) close(r9) sendmsg$can_raw(r9, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x0, 0x1}, 0x16, 0x0, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r10 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="0100000040629a8b27eb8d733fc500000000000000bc453197b5acf340ce8d3cfe39e5b07d0e1d13408ca955e67bc7720aff1a8234d67befcb800b9d942f06734d91cfd0a985d24eb5fde225a94624cc4977ebc918907d69b1a7a15a45cdfe3a80c4de4e494733b2b3ba8c6c404bbfff44411b3d1e341dd9f0fadd20bfd486cf2ac70c556495a0502e2b46f880321ab9b24093dcea1691693f0a3c52c5c52e78a608fa3b46b32bb2b933996f0f8b780304ae5fade6aeb243fa661ab9070c88461e100fec4e7b86763884ae5fb417a2b2e3", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r10, 0x84, 0xe, &(0x7f0000000440)={r11, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r9, 0x84, 0x9, &(0x7f0000000280)={r11, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001b00)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x4, 0x3, 0x10000, 0x7}, &(0x7f0000001bc0)=0x98) sendmsg$inet_sctp(r8, &(0x7f0000001d40)={&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x3cc94538, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9b3}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000340)="e36a4958a4caec1c14798c9fad47c1884484e60784467a4109adfa222d385e640f2eea59362320cf678396894e92c816d076b1d99e069adae01350ccea8608e962300d7bc96efcff179a4079520992599985ea67e8ffe25123ff0f003c7ed0f1d65396e99aaccb0848916acf92518d0c493886055e9863bfe345b42503805389e5afbd1f7d94a760bb0d3ecbe23f0f875f6d0fcec265a59cb79892e91176d583f72d75832886424b9464f6074108b157306fffbca0f1506660abb2569c669e11ed2ae38fe131c2f36369febdde81072a554ca05279bbefc9fcc6d417c59e27fa20d9504b6310", 0xe6}, {&(0x7f00000008c0)="76f5615c727abd9b0e673d8a54e87dc33296c5c7c69bfc0f58cadd620f2d7cb89eeedf998c9ea4094dddbf29d311fabbadff22bd1c08da3e51e83fdd2a3db156c70d8890d41c645fd0f38b0dec0237b8beb2fe4f896342a3f2809721508098986b0bbce1820036aac4264f216442c4cda44dcd8c13fc095f52dc6c08531a8a7ff036e1d408c563fe4214e24cbe0f0bb3904e64150956338505288ac17adf25632f838bd3dfd5319dc9319ab1e67cae31281b63a12a01975e2b1a5e4eeb7b01", 0xbf}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="0acc897be9ee424370b63b056a3b4c586f8c059404251e7c337befbf0bb106776306852d83d47721a217d0c92cb9e8f14ce906bf3b33245466ce7cfe7e8e84b472a44f941a57983478e2606582a83f250d341e65838a832bd230809549461209c7a1eaf0bf", 0x65}, {&(0x7f0000001a00)="84f4e2ba2eb8631dc3c67837e21a8d94cee631ec5b00b0a9b4f1234898c5feecd86e528b43794ecdbfadfa222e88e3e7b11bc4b58dd3c4b91156b5a4741bc3e6a37afe468cc8347b9103ae6eaa378647c03d3e14b1d3a3927c4deefe271dc902b4c6b08e67e7c714a47509", 0x6b}], 0x5, &(0x7f0000001c00)=[@sndrcv={0x30, 0x84, 0x1, {0x7, 0x2, 0x8000, 0x4df, 0x80, 0x79, 0x1, 0x5, r11}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x39c, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xffff, 0xa, 0x5, 0x0, 0x3, 0x6, 0x8, r12}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xfffffff8}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x3, 0x1f, 0x7f}}], 0x128, 0x1}, 0x40000) r13 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r15, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) fcntl$setlease(r15, 0x400, 0x1) close(r13) sendmsg$can_raw(r13, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x1, 0x1}, 0x16, 0x3, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r16 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r16, 0x84, 0xe, &(0x7f0000000440)={r17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r13, 0x84, 0x9, &(0x7f0000000280)={r17, @in6={{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000000100)=@sack_info={r17, 0x7}, &(0x7f0000000000)=0x441) r18 = socket(0x2, 0x803, 0xff) r19 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r20 = fcntl$dupfd(r18, 0x0, r19) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) r21 = dup2(r0, r2) dup3(r21, r1, 0x0) 07:28:22 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8a86]}, 0x45c) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000040)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r2 = socket$kcm(0x29, 0x0, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r3, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) r4 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'gre0\x00', 0x0}) bind$packet(r4, &(0x7f00000003c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$can_bcm(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x1d, r6}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0x803, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "48fa09411def712d902f5004cff7a0fa2b3e6bea84278f39ab90c500da0bf211f87591351d3e104cd10787ac62ac70f16659993ef2e9e95189e6587acd26b8f3"}}, 0x80}}, 0x0) r7 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r7, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) r8 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'gre0\x00', 0x0}) bind$packet(r8, &(0x7f00000003c0)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$can_bcm(r7, &(0x7f0000000300)={&(0x7f0000000040)={0x1d, r10}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="00000000030800000000000005000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0000000001000000000000000000000048fa09411def712d902f5004cff7a0fa2b3e6bea84278f39ab90c500da0bf211f87591351d3e104cd10787ac62ac70f16659993ef2e9e95189e6587acd26b8f3"], 0x80}}, 0x0) sendmsg$inet(r2, &(0x7f00000003c0)={&(0x7f00000000c0)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="c4be58cc92bc6be305035a30e78b998d45f6b1f7818c7020b5e0e7e9ae879b2b268cc8bb41a5ffd771427f6815f716ca198c8fcfd43df36d55b81b8b2fc836d213f18feb10105eeabaff066d8f091b5eefdafc29b94447a6e14f1f2e9b9e709f958ba89d8aeda3eddd4ce542c78e4e5e3d3fa3afa60f146fe852ce64fb41b0ce0094f259b9", 0x85}, {&(0x7f00000001c0)="844ad47963a3396a891b8464840bd29d94466453e8ceafb5ccd5c9e7f62a7ac0786032f58e9795405fcb57e05dcbf225310f208a229cf7335bece3aa15e58a9716ee3679dd7f25dd741045893474fe3dc4d4e04db0cd94ea4495594448a3045076e9383759dc5b9cc4d64cbe1f9a299e24286f009daaa1ef8db9ea75457356c165fefb5973a6d024c23599c2c3d2636416170e232d8f9c221db1d1146b3c7f388da037afcf7bb56395fac5163dcba3a5cf24c0af671300e53635b05fe3e7", 0xbe}, {&(0x7f0000000280)="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", 0xfa}], 0x3, &(0x7f0000000880)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @multicast2, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0xe8}, 0x80) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:22 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xdc}, 0x40) 07:28:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r7, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)={[{0x16, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'cpu'}, {0x0, 'cpu'}, {0x2d, 'memory'}, {0x1f, 'pids'}, {0x2b, 'pids'}, {0x2d, 'pids'}, {0x2b, 'rdma'}]}, 0x37) r8 = dup2(r0, r2) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) sync_file_range(r9, 0x7, 0xb0f0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) dup3(r8, r10, 0x0) 07:28:22 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x1f000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:22 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xdc}, 0x40) [ 589.921164] input: syz1 as /devices/virtual/input/input247 07:28:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r7 = syz_open_procfs(r6, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r7, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)={[{0x16, 'cpu'}, {0x2d, 'memory'}, {0x2b, 'cpu'}, {0x0, 'cpu'}, {0x2d, 'memory'}, {0x1f, 'pids'}, {0x2b, 'pids'}, {0x2d, 'pids'}, {0x2b, 'rdma'}]}, 0x37) r8 = dup2(r0, r2) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) sync_file_range(r9, 0x7, 0xb0f0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) dup3(r8, r10, 0x0) 07:28:22 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) [ 590.067734] input: syz1 as /devices/virtual/input/input248 07:28:22 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x7, 0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0xdc}, 0x40) 07:28:22 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:22 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0xffff8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x20200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r6, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r8 = syz_open_procfs(r7, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r8, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, 0x0, 0x0) ioctl$UI_SET_KEYBIT(r8, 0x40045565, 0x2ad) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x20000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:23 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 590.377374] input: syz1 as /devices/virtual/input/input249 07:28:23 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x7, 0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0xdc}, 0x40) 07:28:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0xdec82000) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x6) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) 07:28:23 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xc5, 0xff, 0x80, 0x20, 0x0, 0x7, 0x602, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x8, 0x100000000}, 0x2320, 0x100000000, 0x2, 0x0, 0x3, 0x1, 0xffff}, r1, 0xf, 0xffffffffffffffff, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r3}}, 0x284) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) 07:28:23 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x7, 0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0xdc}, 0x40) [ 590.709569] input: syz1 as /devices/virtual/input/input251 07:28:23 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) io_setup(0xff, &(0x7f00000004c0)=0x0) io_submit(r7, 0x10690, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r10 = syz_open_procfs(r9, &(0x7f0000000040)='net/ip6_mr_vif\x00') r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x101000, 0x0) ioctl$TIOCGICOUNT(r11, 0x545d, 0x0) lseek(r10, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r10, 0x84, 0x23, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r13 = syz_open_procfs(r12, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r13, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r13, 0x84, 0x23, 0x0, 0x0) io_cancel(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4, 0x200, r8, &(0x7f0000000500)="45af2af863eff783711a090f15c24f97207930cc35aa3904ba05c0c033ee5d23ae02a9681365c87381f189d63de659d2d400e28876a0cf3e32ad429bdd63120a85b6a25366257a19b2c07a25b44ea283e134d0c3275589b3dc2c10e1efcf2e72b3670b43db3d43828d3bd2e4ec175d71d04422d631dcd01b43eda2ce04908d43ca6c99840cdda44f4219ffa80a08f942c338accc3c59b92d9530f3d0c24ef07fbc750ae977918492066b2e760b77efff7193517f8743a6e8ef405045b82a1c6809bf39ebe2a33814457c044fb88638b90a08ebfcde432fae429367806c98a68d95bf98d0b6b66de5f7e622b4f65b385b6f925f54fffa7c67ff838a6616596eca8289e8006ccf8357368c6beb2dca9129c5b25470bcfe68cda37f177f32c34210c2d4be12bcaa35ba2dd06fbbef51e72cc9c10e5053c92a42cda1f417384e", 0x13e, 0xffffffffffff8000, 0x0, 0x2, r13}, &(0x7f00000001c0)) dup3(r6, r1, 0x0) 07:28:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x3f000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:23 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xb, 0x0, &(0x7f0000000080)='\x00'/11, 0x0, 0xdc}, 0x40) [ 590.835251] input: syz1 as /devices/virtual/input/input252 07:28:23 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:23 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000000), 0x4) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:23 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:23 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xb, 0x0, &(0x7f0000000080)='\x00'/11, 0x0, 0xdc}, 0x40) [ 591.199889] input: syz1 as /devices/virtual/input/input253 07:28:23 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:23 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xb, 0x0, &(0x7f0000000080)='\x00'/11, 0x0, 0xdc}, 0x40) 07:28:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x40000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x18400, 0x0) getdents64(r4, &(0x7f0000000080)=""/191, 0xbf) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r2) dup3(r7, r1, 0x0) 07:28:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:24 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xd, 0x0, &(0x7f0000000080)="00000000000000000000000010", 0x0, 0xdc}, 0x40) 07:28:24 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:24 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x14, r3, 0xfc373bf004be72e5}, 0x14}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40020010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x48000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 591.783640] input: syz1 as /devices/virtual/input/input255 07:28:24 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x37, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:24 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xd, 0x0, &(0x7f0000000080)="00000000000000000000000010", 0x0, 0xdc}, 0x40) 07:28:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r6, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x84045202}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r7, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c}, 0x100) r8 = dup2(r0, r2) dup3(r8, r1, 0x0) 07:28:24 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:24 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x37, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:24 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xd, 0x0, &(0x7f0000000080)="00000000000000000000000010", 0x0, 0xdc}, 0x40) [ 592.111753] input: syz1 as /devices/virtual/input/input257 07:28:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) mmap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x4, 0x10032, r1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r3) dup3(r7, r2, 0x0) 07:28:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x4c000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 592.266967] input: syz1 as /devices/virtual/input/input258 07:28:25 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x37, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:25 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0}, 0x40) 07:28:25 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x358], [0x0, 0xa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e5cbf03]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r3}}, 0x284) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x34a6b8eab64abf3, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r5, 0x0, 0x489, &(0x7f0000000280)={{0x1dc, @local, 0x4e24, 0x1, 'lc\x00', 0x20, 0x5, 0x40}, {@broadcast, 0x4e24, 0x4, 0x5, 0xa1a, 0x8}}, 0x44) r6 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r6, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r7, 0x4) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 07:28:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0xfd, 0x1, 0xc6e0, {0x5815, 0x712b}, {0x7, 0x3ff}, @ramp={0x0, 0x0, {0xd60, 0x8, 0x9}}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:25 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x53, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 592.559777] input: syz1 as /devices/virtual/input/input259 07:28:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)={0xaa, 0x5}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x210800, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000140)='./file0\x00') getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x448082) bind$x25(r7, &(0x7f0000000080)={0x9, @remote={[], 0x2}}, 0x12) r8 = dup2(r0, r2) dup3(r8, r1, 0x0) 07:28:25 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0}, 0x40) 07:28:25 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x53, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 592.733106] input: syz1 as /devices/virtual/input/input260 07:28:25 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0}, 0x40) 07:28:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x68000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:25 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x53, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000100)=0x8) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xb5, 0x4000) 07:28:25 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000020105"], 0x7}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 07:28:25 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r4, 0x203ffffd, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r5 = openat$vcs(0xffffffffffffff9c, 0x0, 0x200080, 0x0) ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) r6 = open(0x0, 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(r6, 0xffffffffffffffff, 0x0, 0x7fffffff) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000001c0), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') fchdir(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r7 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) 07:28:25 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:28:25 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 593.163581] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.171333] bridge0: port 1(bridge_slave_0) entered disabled state 07:28:25 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:28:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6b6b6b00}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:26 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:26 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:28:26 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:26 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 07:28:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6c000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:26 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 07:28:26 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x67, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:26 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x73d], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x5, 0x5, 0xe009}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000480)=0x4) mkdirat(r4, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f0000000280)='./file0\x00', 0x2) fstat(r5, 0x0) r6 = dup(0xffffffffffffffff) setsockopt$packet_add_memb(r6, 0x107, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x1, @local}, 0x178) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x4c0, 0x258, 0x0, 0x0, 0x0, 0x258, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x4, &(0x7f0000000580), {[{{@ipv6={@loopback, @local, [0xffffffff, 0xffffff00, 0xff000000, 0xffffffff], [0xeefd1596c94844e6, 0xffffff00, 0xff, 0xff], 'bpq0\x00', 'ip6erspan0\x00', {}, {0xff}, 0x2, 0x20, 0x8, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x2, 0x2}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0xff80}}}, {{@ipv6={@local, @empty, [0xffffffff, 0xffffffff], [0xffffff00, 0x0, 0xff, 0x1fffffffe], 'caif0\x00', 'rose0\x00', {}, {0xff}, 0x32, 0x9, 0x2}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x80, 0x4}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x7}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x84, 0xd3}, {0x1, 0xe1, 0x4}}}}, {{@ipv6={@rand_addr="170282c38dadd82d09194a955d8119f9", @rand_addr="1aa18e9e1f8450ae80e1e9ff435d9298", [0xff, 0xff000000, 0x0, 0x80ffff80], [0xff, 0xff000000, 0xffffffff, 0xff000000], 'batadv0\x00', 'ip6gretap0\x00', {0xff}, {0x391069d0e0901ad9}, 0x0, 0x5b, 0x1, 0x68}, 0x0, 0x158, 0x198, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x4f, 0x4, 0x0, 0x4d, 0xff81, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x27}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0x0, 0xffffff00, 0xff], [0xff000000, 0x0, 0xff000000, 0xffffffff], [0x0, 0xff000000, 0xff, 0xff], 0x200, 0x40}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "1ec3749b05de8a33554f0b0ddb454a79e9f10c6fb8b03422fa1fa2c714fa"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) fcntl$getflags(0xffffffffffffffff, 0x401) sendfile(r1, r2, 0x0, 0x8000fffffffe) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') recvfrom(0xffffffffffffffff, &(0x7f0000000300)=""/198, 0xc6, 0x0, &(0x7f0000000500)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x24}}}, 0x80) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4c014) 07:28:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) r6 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r6, 0x400, 0x0) close(r6) r7 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r7, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) r8 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'gre0\x00', 0x0}) bind$packet(r8, &(0x7f00000003c0)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$can_bcm(r7, &(0x7f0000000300)={&(0x7f0000000040)={0x1d, r10}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x0, 0x803, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "48fa09411def712d902f5004cff7a0fa2b3e6bea84278f39ab90c500da0bf211f87591351d3e104cd10787ac62ac70f16659993ef2e9e95189e6587acd26b8f3"}}, 0x80}}, 0x0) sendmsg$can_raw(r6, &(0x7f0000000300)={&(0x7f0000000200)={0x1d, r10}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x1, 0x1}, 0x21, 0x3, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r11 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r11, 0x84, 0xe, &(0x7f0000000440)={r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000280)={r12, @in6={{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000140)={r12}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r13 = dup2(r0, r2) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) r14 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r14, 0x84, 0xf, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, r14) setsockopt$SO_BINDTODEVICE(r14, 0x1, 0x19, &(0x7f0000000000)='teql0\x00', 0x10) dup3(r13, r1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r16 = syz_open_procfs(r15, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r16, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r16, 0x84, 0x23, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getsockopt$TIPC_SOCK_RECVQ_DEPTH(r16, 0x10f, 0x84, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 07:28:26 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 07:28:26 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x67, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x74000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:27 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x67, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffec5}}], 0x400000000000049, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'team_slave_1\x00', {0x2, 0x4e22, @empty}}) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x402600, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) pipe(&(0x7f0000000200)) 07:28:27 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6b, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:27 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x111200, 0x0) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000280)="7fb620f8abf345220c46216fb885aa89152065081f548d8c75266776b318c2f730ff6d86e6b3c58ec6b1321e13f232b8f5e091cf5c2fa192a91eab57906dd1346d82bc5d2af0ba7a34a802bb955422868f54f722678b5a3b182b34982e58ac1523276bc5b8fbffcfd49f69c8d0", 0x6d) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = creat(0x0, 0x0) ioctl$KVM_GET_PIT(r2, 0xc048ae65, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000100)={0x0, @tick=0x3, 0x21, {0xd9, 0x91}, 0x3}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00'}) r5 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r5, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d0400080008001e000800009272f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r10 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r10, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c26234d0400080008001e000800009272f07dc728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) fsetxattr(r10, &(0x7f00000003c0)=@random={'security.', 'team0\x00'}, &(0x7f0000000400)='[\x00', 0x2, 0x2) getsockname$packet(r8, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r11}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x43b, 0x0, 0x0, {0x0, 0x0, 0x0, r11}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0xb694d547739efd33}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000300)={@remote, 0x59, r11}) socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_MASTER={0x8}, @IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@tunl_policy, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x17}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @mcast2}]}}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004048}, 0x28800) 07:28:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x7a000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:27 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6b, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 594.838059] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 594.871326] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 594.888197] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 594.976005] IPv6: sit2: Disabled Multicast RS 07:28:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) fcntl$setstatus(r1, 0x4, 0x44800) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000080)) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0xfffffffffffffffe, 0x0, {{0x8000, 0x0, 0x2}}}, 0x28) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x422481, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r6, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r6, 0x0, 0x21, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00'}, 0x30) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x7, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x0, 0x0, 0x0, 0x800, 0x0, 0x6}, r7, 0x4, 0xffffffffffffffff, 0x1) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) 07:28:28 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6b, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xfffffec5}}], 0x400000000000049, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='status\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'team_slave_1\x00', {0x2, 0x4e22, @empty}}) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x402600, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) pipe(&(0x7f0000000200)) 07:28:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x8cffffff}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:29 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) dup2(r1, r2) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:29 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) fcntl$setstatus(r1, 0x4, 0x44800) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000080)) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0xfffffffffffffffe, 0x0, {{0x8000, 0x0, 0x2, r6}}}, 0x28) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x422481, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r6, r7, 0x0, 0x21, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00'}, 0x30) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) 07:28:29 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r6, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r8}}, 0x284) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r8, 0x2cdabef5, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x3ff, @remote, 0x63}, @in={0x2, 0x4e22, @multicast2}}}, 0x118) r9 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = dup2(r0, r2) dup3(r10, r1, 0x0) 07:28:29 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 07:28:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x97ffffff}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:29 executing program 0: 07:28:30 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:30 executing program 0: 07:28:30 executing program 3: 07:28:30 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc0000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 599.635445] device bridge_slave_1 left promiscuous mode [ 599.641032] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.683389] device bridge_slave_0 left promiscuous mode [ 599.688917] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.914496] device hsr_slave_1 left promiscuous mode [ 602.967646] device hsr_slave_0 left promiscuous mode [ 603.015685] team0 (unregistering): Port device team_slave_1 removed [ 603.027517] team0 (unregistering): Port device team_slave_0 removed [ 603.037699] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 603.086499] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 603.172397] bond0 (unregistering): Released all slaves [ 603.234524] IPVS: ftp: loaded support on port[0] = 21 [ 603.303216] chnl_net:caif_netlink_parms(): no params data found [ 603.345227] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.351681] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.358870] device bridge_slave_0 entered promiscuous mode [ 603.366579] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.373189] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.380334] device bridge_slave_1 entered promiscuous mode [ 603.401262] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 603.411058] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 603.428784] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 603.436366] team0: Port device team_slave_0 added [ 603.442647] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 603.449957] team0: Port device team_slave_1 added [ 603.513240] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 603.582068] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 603.655701] device hsr_slave_0 entered promiscuous mode [ 603.723041] device hsr_slave_1 entered promiscuous mode [ 603.763681] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 603.771042] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 603.800327] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.806766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 603.813456] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.819828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.892422] 8021q: adding VLAN 0 to HW filter on device bond0 [ 603.937849] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 603.957773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 603.971623] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.991454] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.003817] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 604.009929] 8021q: adding VLAN 0 to HW filter on device team0 [ 604.027507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.041427] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.047862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.079334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 604.088076] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.094512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.119018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 604.132369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 604.141762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 604.161006] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 604.178555] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 604.186085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 604.199024] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 604.208079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 604.230449] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 604.247600] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 604.261057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 604.269787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 604.288838] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 604.351140] input: syz1 as /devices/virtual/input/input262 07:28:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xc0ed0000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:37 executing program 0: 07:28:37 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:37 executing program 3: 07:28:37 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x14000, 0x0) write$FUSE_DIRENT(r1, &(0x7f00000000c0)={0x48, 0x0, 0x3, [{0x2, 0x1, 0x5, 0x4, 'syz1\x00'}, {0x5, 0x1ff, 0x0, 0x2}]}, 0x48) ioctl$UI_DEV_CREATE(r0, 0x5501) 07:28:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0xfff0, @mcast1, 0x8}}, [0xc3d5, 0x8, 0x9, 0x1, 0x8, 0x9e1f, 0x2, 0x80000001, 0x101, 0xfd6, 0x7, 0x7, 0x5, 0x5, 0xb0]}, &(0x7f0000000000)=0x100) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r4, 0x400, 0x0) close(r4) sendmsg$can_raw(r4, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x0, 0x1}, 0x16, 0x0, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000440)={r6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={r6, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001b00)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x4, 0x3, 0x10000, 0x7}, &(0x7f0000001bc0)=0x98) sendmsg$inet_sctp(r3, &(0x7f0000001d40)={&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x3cc94538, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9b3}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000740)="e36a4958a4caec1c14798c9fad47c1884484e60784467a4109adfa222d385e640f2eea59362320cf678396894e92c816d076b1d99e069adae01350ccea8608e962300d7bc96efcff179a4079520992599985ea67e8ffe25123ff0f003c7ed0f1d65396e99aaccb0848916acf92518d0c493886055e9863bfe345b42503805389e5afbd1f7d94a760bb0d3ecbe23f0f875f6d0fcec265a59cb79892e91176d583f72d75832886424b9464f6074108b157306fffbca0f1506660abb2569c669e11ed2ae38fe131c2f36369febdde81072a554ca05279bbefc9fcc6d417c59e27fa20d9504b6310", 0xe6}, {&(0x7f00000008c0)="76f5615c727abd9b0e673d8a54e87dc33296c5c7c69bfc0f58cadd620f2d7cb89eeedf998c9ea4094dddbf29d311fabbadff22bd1c08da3e51e83fdd2a3db156c70d8890d41c645fd0f38b0dec0237b8beb2fe4f896342a3f2809721508098986b0bbce1820036aac4264f216442c4cda44dcd8c13fc095f52dc6c08531a8a7ff036e1d408c563fe4214e24cbe0f0bb3904e64150956338505288ac17adf25632f838bd3dfd5319dc9319ab1e67cae31281b63a12a01975e2b1a5e4eeb7b01", 0xbf}, {&(0x7f0000000980)="3a70b0be659c00391346baa8aa51beb73f0151c53876f5a5cb40d3aa074ce5d1a03ffcf0f303ab81d65ecd086ee91ccddaf627a8657b42dde76cf1e7f01073888dda81f9f028391ae957cba32ad1a2e13eba013c67d9af87f3dc389ba90607b67dcc4b0d153e1905c4008f478ce1c7ccd938cfafbf7370d174487865d9108c23b0fc5b22a2b51e65390bc7b0459ab8f71b045a421963766a34055ff5949152439c6537884693c7f290985ecf51896fbfa1a67c2fcc3ef356901fb4b6d0d117ddd4d2eaac5fc8429791910cd36d13649ff401529d6cc4b94f52ae2ffd1f9312fe5e32d86ffbcf3d9dba73d2f0b5a85b5cf80efb65187d312d27a2f2ee2d0562971a20411b52febed6cdb5eb5219123f2d28c952e18158ff6938d0243cb0d4a60b58927a0db40172bb7ae30571d2026cbe21eba20cace9679ba202cb11d4922c34afef6bdd0190400c1d4d052536473215a737e529b4a2a739771b0b32ae3164b7bcc932d20bcff2b49470a0185f0237f1d59b8913c0e17f1f9440a4cb9d48fa8e31c2e4b1d20dc5954b13e8536e23b73f4b8263f8a874929921273fb26fbc8f1a548d7e17de27cab3f589edddb9c627180a630034989e5da5549fc6db87f0784e582e4520391a1cb2806430ae727dd03a9af0dbc5ebb1b18274bbcebd293521ed30c81db6fc3db8455d3fb066b5dd45104ee7961a12ee50d4bf0af46a8921b4173e7b0e3210dda4814e8be4b7bcd25330242e1c4a7ba4db2adf20cf76d109492101318eb5e0c36de2b6f6e030f040230b2061e8ae92ba29fd7cf4c22bd40186f79201c1d4aa751a024c897f7942fdad8fd6d9f1023b2cab9f5b09c90776398c6c8558f64bc6b4dcba8032c3b6836ce9a4b80d8e6a480074bdf5671ba86544d3d831d28b7d176c62557d614912b5ba15d585586a4a2c15ebac013cfad864e1ab4519cd7c5320e28f7cf1edcb6a84129dcdd556cae5f08dafbe902d2497e3c17da5e456701673b1a422a5e3e752bc4fbd518628de0493a9eb91fbf9c90abfffa08036f6127e7a0a16ea8e3c6b1457e22d3df18a0b371a72a8ed4abc3544f70821e2768670dcaddae0e06c1dda46f4f8e055bebaabdb70043434a00342b488d3b027020eda7b13bd3c6cbcebf33d8936a93e2254cefb799912c090e5f300c3033f813df8d1e47ecf57e4704fe578d42f5e7e068d67d952dca241a43f77ad7fa594c8af17f44301f9037855475be219b566b435d73a77a4c51e148ba56e738a2a774136331a436cbbbcefa1fbd8eeabd102f5c3d4df37667e07055749731ea5e1efc4c4f0366cda6d2209fa0762311f96f6537cfef730f6c71c0697fd1f799be9ca59960728d6b5e342432f314683991bb353406e6a31f7f2d0396349ae859ab7deee146bd9b112583f36a4e34c372d763eec039aefbbf30da33712cdefdbd0e7fc81cb70a2e95fe4269e76379aee0a1f202c4577ba097b0b7f348033f961366d46398403dbe4f58db7b499d1b2b532590d4b18ded4c62cc440b1288ba91d72ab23d907400acb3932de6f00414ca9dd09148d69d413e4d2cea417ef65b96e9988479dfa14c077b7f65df1cd89f63380d2d5b9f6cb6270e8dc24e29825bd2deb63d668e6c48c1a3b11a8d40a6cd55fb4ae3598a31fe1acfd95b838e36426adf031c994f685a989ad8180548fd7c2b51b5271c59db5f37199850d7d13c30ed86bac027cab734abde5d3829c385bb3a3e6848d8366257170d62aa137aa4ad9abc76df3e525cceb819d5a474e9bad5c643faf8c63477fb506c6fe0541729fbbb019d9bb58b97fee109e82899425dd3774ee6eb4d1d7955693770ea2b6cc9acf7db088c40583b58d2dba202e24176785b6b1f3becd6262076f8ee01eb2ad62db71b4d2d944422b5c4ed042afceee949f01ff9fe815641377243ee11f282c358543b2ffeb8a13d9b1c0beb2af1134c9acae677ade0558a5f0307ceb2bfef5103e7f0730fad7c7d147752e2448e0cd8b63476394a1f9bcb5c006b34dd238bafe6c9962f32f739074035f7c557a2988c8dcfbdc4fb0cf225d5efb654fc225930784425ab01b21dc92f8f46b9cfe62c56ea5278ed1613853e5eaee8303e70e41a7ce3ecd5dc6c3b78068dd2c921942328339847dca62b7b9040452ffa5609f970ecb02452e7351537deb9074e8070048d4d1db47102c3857b0b0e5d8ba8821924557d35db8c74bd9006b0b76b951d1e8121e689963db0473ede784208b59916ec6ed1f6d8fe2d3383b141ac7cd17c295fa9a09e7f3beddde31e74f5c737ac19bdd6f70e8fb21b38606fcd609647f9560c7249062d22c3101cee22dcc3de62f442e2ae21badb363083389e5bd349fc4cfa7c570d9157c13b69b97733a6ed6716c77a8d5f2876ea839c780fa3892bdd27a06a84aa276819848a459d52e206c698f4237768324edaae4e2d515f1c34190af8a3a0415306911ec3f02e0d08f7e9688839c918a653a47fde00025002bd8f27b170683ec03f569e2992d6673e4cbfca658302ab5475f583c628eb1d380f9ef765ac4e655b6f3110646ee851681661ac456ad3c87498dd8aba16d95b85a57c17c45e83d58ea3c2e714b70423517f0fc1cc1bde5d58c4800d15f6f84df67daf53ecb2b2ccffaf32a52ee42da18cd0e896251abb4e3a34b775ccd4185d1e508a09fd3515ede9dcdf949dc9a74e5ac1b4c302f44d41827d7afe68ffc9d4dfa62fe97cae4dcd6da7a15c510a218c6dbe64d27ab187a43b25abe3e12ea67b6e93cc4050c78a875da9dd2bcb1ebbedb58bbea07ff4a5a4a8d019472f9651787de32a0323bf09ef1622a4550d51351011cc136a0ed0a42350f0731e234b4300519704c22ebca00262c5ff6fcbde6b473d26492f1e8b069761c7786dee5f9aabbed0e53c583540d79661781b59a5ef40195a58cf6fb9d1f9670d8cfa3ff3a5a2114e42b896a7d3c0ee882e0be968ff099a06999684a84b69a1eaef3afda299dd44e5a228056463bb038430205d5b16f2a3f07720309cd705a434b46a73e7fb6c220ce565e332df2c510dca2280db21a405a079ae5f6a6af17a6e9a7f9b5e7102d377e035e4e98de38f32c4b9dce141c29a78bd1c584ea526bb9adb351da2a6ae5dd9e7c48c1b4006d019039ef256146db31abd8a1757c61a4978e23d9b987f5235bed1cb12c90ad2c76be0363552631556d0e76cf5d1e0b4ca4c53379dabbd085a0e190dd665ee358b122becd79a8ef9fdb8adcc4cbc1bc8895d598be7db71f4631a4de99993252e0f7b4bf2a38bb27cb27579d95fdf9d7316610fb648bb04fb7422655173100b24fff81c40fa6df0be9a0ab6cae25fb08a248307fc0bebc8f1c7192e4b16fcd71b99088908cdd409d82a04b007bb080fc820f908064938684ef232f7ecdc7ef22274e54528d96c39538283a92ad0c6fb53c52e8874395a26a75971b83e0ce34fe9953d55af26af71c281d339ac51c346e6b80f4fdaa0c53f384049dca9df0b1b94d5fe3ffa293b44338f46700cef37698a4b879ed0631aa332ce3d14aabf3d35bff7290d7ff732d6da13fa71e4cf601a9d40426a5925ff3742bb86ca540b439f5e6c6ba8b441cf281ac6cee083bf5e0a196b26f61d0b7e15ed9db9f90e83d73369725679149aa3b9377021cacdee3f37ce0e28c27b98f504205fdc889d8869bea3a5cac60d177dcb16c7879c743217435c2573064f9c3d7e42459edcd5878262235013f2c3da7723061800484cc61d9448d311666768587fb8b90f31183cfbdf9629991461bc387871a95b025796ae78693ff1ef851c8f0e5aa1c54c4fc2a497d9ebe32a61ed3863b0ade3184ce6484ce1d474785341c07cc6a8240b3f00c57e5a6ae83fad25c7b7d328c76a0d46b610cfc99a58b3d214a7763064bc633fbe53ba8805ba1fab84bea8e347eb64052a2eb02e8198a8ce6845aa41f42066ce4d4399d0050c373a67c1d1cb78a312a2a07a5ae937a0c656f86d85f4be936caf0f64da326eb5f8632febc8f84b44105659e17ce2649414ad19f5fef651eced86e9020f39fe5f07ce0c1a5b0147497e6f792e88fff8f263b8c4862524d08562da104cce6e515fedea1b376c0af36b1981935aeb70a9afdaaf5c7b961065f9d1dffb4b93c42f0419e31ad5222e22d890e7da7ef607395f5d1cc123fca41eac757791c368514c42d9f30d3da86558903eaf833ebc6ce3ef365da62a2ad9dc3e2f49cd53e5fa5d8d36275b9896cb582bc647108d9f4372fe78d58e16ba0610a4468c38e895a51eb332101b782a09e99f8d2a3b1218e90089e379d23c182aab75e8474513c3ed8430cf58403ac78d8ba0822a1533fba91fdfad0c79a0021b9822721dce4540492931ca019b2bfccc74bb72a40889a061c13f19131662b9f60ce5f35d9c09d895ffd48b4773e409e97836ac5da186425194478507054ed5e1cb9b54c20ec78ae4a8bd3422d0ef4cf4156444c0e439a7e5646e5b5bfff8c525f3f1eee0c50cdd41f9ce3a7e6893ebb7eb23d80117c959bc969aad1ee74b350ea6b060faa67e14c0dd4666dae7d7fb743082ee8cbafdf8db678bdf17615f8347322e17b101b68ed05fb7b9bd80ac423b1229044cde1636f760b4f59ea70441a60c6068b226b6b72867d4aab15e0fc00518784ae4f4a218878493cfb12e6619ff46395231b214fe0c1372671bdd82e9fb42e85c309436e83855d7828fd506d2eb88bab147986faee3d8bcf574b44cc8c985a569382e8e1edaa1dd13eea9116c6178d7fb30f7c311a61bd0eaadd1cf45f1d170fb2d8c4c386a2e98a2f39d2e260e19df04f9a13b56575ddb81fcc8d71a5e94de4e053c59b0c2956f042c9056d3fb8782035435ce6c06ab6cc18b47b8f1106a144838d231ef41d61e6b5464578a4da4c8bac1032703481b9e68a939424c7c48252fea192f7e1db330ff2b511d0cdc09a36cfec9896c4a2b4575fa4edd6a76a25bbfab1bfd2738702a57062916cca824e3f8ff9871da560b7aa81063d932648e9d5833311ccde087b4f16bd55aa3deb18defecb85cf354da5e96dcfed6cb628f74d8e5707e71e1eb49c00d46085cc639623229947a3135c59c0ede187bd23b175f01c1c537b311d25192838b7e52e97dcc21a210b4232d9dd3fd2f56d31b45f10602264310ac12200f4abcd9e9e9e177c9c840314039bc9afdf0f32e54aba1ae9c092a2d9ce466270ad7fb9cdae2b27116fc1c4a7ca2e9f45f60af588d2358b70a260bedd6203d45b48fe7ee01bf0e066d61e442aac7df266155ef387e31028441265c475588978fa0a56df80f3408179ce72ea1941416caf763c00aae0122304e744138616ed0b886a165f313f35e78913c74a7f93f20f6aaa8bfaa04deb7dc0cf510c8e23e70f0a8999f5b98d7e924ef87feb145dd9b26ee8fd943d0cee451901aaadab1386ae0b965f82c721dfd909735ea9c0f4ec199a4f740b988337eef3dbf003fcb7191eabb2ab5e25a11deab800128787c601af68d02f0934b836b51c8b12644294bb7c15d952b8560c2617f4337b43b412cbf94972b283fb3e53cd9d3fa5c8719889f941d7dc5fa0140346c6fd3a189dc80bd232c8f9c4865a46857ea4f2a9a595744b7184e19b0b4eeac20b23b2dceff8c4c1e206251a723f3908ef18afe307b14f677c954f30d6e8c4ae1894ac797adace673119d6e35025dc8e6659213886266a975cf13f426eea998a433a2aa0fa4780a3d8a01f92ee4246d72c0da1ea6873b053f620f1d172452738086ddf847cc2a4a1f6941c2d19815100e44c9a12e2f6390dc161", 0x1000}, {&(0x7f0000001980)="0acc897be9ee424370b63b056a3b4c586f8c059404251e7c337befbf0bb106776306852d83d47721a217d0c92cb9e8f14ce906bf3b33245466ce7cfe7e8e84b472a44f941a57983478e2606582a83f250d341e65838a832bd230809549461209c7a1eaf0bf", 0x65}, {&(0x7f0000001a00)="84f4e2ba2eb8631dc3c67837e21a8d94cee631ec5b00b0a9b4f1234898c5feecd86e528b43794ecdbfadfa222e88e3e7b11bc4b58dd3c4b91156b5a4741bc3e6a37afe468cc8347b9103ae6eaa378647c03d3e14b1d3a3927c4deefe271dc902b4c6b08e67e7c714a47509", 0x6b}], 0x5, &(0x7f0000001c00)=[@sndrcv={0x30, 0x84, 0x1, {0x7, 0x2, 0x8000, 0x4df, 0x80, 0x79, 0x1, 0x5, r6}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xffff, 0xa, 0x5, 0x0, 0x3, 0x6, 0x8, r7}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xfffffff8}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x3, 0x1f, 0x7f}}], 0x128, 0x1}, 0x40000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000200)={0x1f75, 0x8001, 0x0, 0x894b748a, 0x8, 0x4, 0xfffffcab, 0xb, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f00000001c0)=@sack_info={r8, 0x5, 0x88ab}, &(0x7f0000002000)=0xc) r9 = socket(0x2, 0x803, 0xff) r10 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = dup2(r0, r2) dup3(r12, r1, 0x0) 07:28:37 executing program 0: 07:28:37 executing program 3: creat(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f00000000c0)) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) 07:28:37 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6d, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) socket$nl_route(0x10, 0x3, 0x0) 07:28:37 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000280)={0x2, 'tunl0\x00', 0x4}, 0x18) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fcd000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) ioctl$SIOCX25SENDCALLACCPT(r5, 0x89e9) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, 0x0, 0x0) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x8c) ioctl$EVIOCGBITSW(r6, 0x80404525, &(0x7f0000000100)=""/15) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000000)='syz0\x00') 07:28:37 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="58d51ab24bb9d66f40c79f0a700510592ce5e02f74cec78e4e7d069cda2bb294fe9f720a3fe45712a500f91ac21e86db5f3766a8f823"]) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x36) wait4(0x0, 0x0, 0x0, 0x0) 07:28:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xf6ffffff}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 07:28:37 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/882], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 605.007142] input: syz1 as /devices/virtual/input/input266 [ 605.052863] Invalid option length (64689) for dns_resolver key 07:28:37 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/882], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 605.185491] input: syz1 as /devices/virtual/input/input267 07:28:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r8 = syz_open_procfs(r7, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r8, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, 0x0, 0x0) ioctl$VT_WAITACTIVE(r8, 0x5607) 07:28:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x100000078, 0x0, 0x0, 0x800e00605) r1 = dup(r0) shutdown(r1, 0x0) 07:28:38 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x400000) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/107) 07:28:38 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xf61, 0x0) 07:28:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xfcfdffff}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:38 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/882], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 605.500335] audit: type=1800 audit(1574494118.145:108): pid=769 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16602 res=0 07:28:38 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/884], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x3000005, 0x80010, r1, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r4 = socket(0x2, 0x803, 0xff) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, &(0x7f0000000000)=0x40) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r0, r3) dup3(r7, r2, 0x0) [ 605.551928] input: syz1 as /devices/virtual/input/input268 07:28:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 605.684949] input: syz1 as /devices/virtual/input/input269 07:28:38 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/884], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) creat(&(0x7f0000000080)='./bus\x00', 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xfdfdffff}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:38 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0xfffffffd]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 605.955173] input: syz1 as /devices/virtual/input/input270 07:28:38 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/884], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 606.099217] input: syz1 as /devices/virtual/input/input271 07:28:38 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xfdffffff}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:38 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x53, 0x1ed427cd52e48edf) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000040)) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) creat(&(0x7f0000000080)='./bus\x00', 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:38 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r1, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000001700)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) r6 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r6, 0xb) shmat(r6, &(0x7f0000ffc000/0x4000)=nil, 0x2000) shmctl$SHM_INFO(r6, 0xe, &(0x7f0000000200)=""/251) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r8 = syz_open_procfs(r7, &(0x7f0000000040)='net/ip6_mr_vif\x00') setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, 0x0, 0x0) r9 = syz_open_dev$vcsn(&(0x7f0000001740)='/dev/vcs#\x00', 0x5, 0x99d0c0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000001780)=0xe8) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) recvmsg$kcm(r8, &(0x7f0000000440)={&(0x7f0000000080)=@ax25={{0x3, @rose}, [@remote, @null, @bcast, @bcast, @remote, @remote, @default, @default]}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/13, 0xd}, {&(0x7f00000004c0)=""/185, 0xb9}, {&(0x7f0000000580)=""/99, 0x2b4}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x4, &(0x7f0000001600)=""/200, 0xc8}, 0x8000) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r10, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r11 = socket(0x2, 0x803, 0xff) r12 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) setsockopt$sock_timeval(r11, 0x1, 0x15, &(0x7f00000001c0), 0x10) r13 = fcntl$dupfd(r11, 0x0, r12) setsockopt$inet_sctp6_SCTP_CONTEXT(r10, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = dup2(r2, r10) dup3(r14, r3, 0x0) 07:28:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0xfd, 0x1, 0xc6e0, {0x5815, 0x712b}, {0x7, 0x3ff}, @ramp={0x0, 0x0, {0xd60, 0x8, 0x9}}}) pipe(0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:39 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 606.448000] input: syz1 as /devices/virtual/input/input272 07:28:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="335f0029acfb431b5f762a0004003d40282ee614256bca98f0036ec634a10f384531cc8cf07079736103a2e4598a58f96c47d787589e4b8d06000000c8450264b5d9564db526cb562d9c8cfb33944477e30e79bb6dd7f6661c809ddc443c5c000100010057fd65c7be3902f6ff0000"], 0x14}, 0x1, 0x0, 0x0, 0xd0949c2f665f13d7}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0xf4, r5, 0x401, 0x70bd27, 0x25dfdbfe, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0xc9b}}, {0x8, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x3}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x2}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000040}, 0x840) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000280)=0x8) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r7 = socket(0x2, 0x803, 0xff) r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) setsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x24, &(0x7f0000000180), 0x20000188) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = dup2(r0, r6) dup3(r10, r1, 0x0) 07:28:39 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xfffffdfc}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 606.650222] input: syz1 as /devices/virtual/input/input273 07:28:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) creat(&(0x7f0000000080)='./bus\x00', 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:39 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r8 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r8, &(0x7f00000003c0), 0x63) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0xfd, 0x1, 0xc6e0, {0x5815, 0x712b}, {0x7, 0x3ff}, @ramp={0x0, 0x0, {0xd60, 0x8, 0x9}}}) pipe(0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x2) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r2, &(0x7f0000000200)='s', 0x1) keyctl$update(0x2, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) r6 = accept4$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @empty}, &(0x7f0000000300)=0x10, 0x1800) setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000000380)={0x32c9990f, {{0x2, 0x4e23, @empty}}, 0x1, 0x1, [{{0x2, 0x4e23, @broadcast}}]}, 0x110) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r7, 0x0, 0x0) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$join(0x1, &(0x7f0000000140)={'syz', 0x0}) r9 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r10 = creat(&(0x7f0000000080)='./bus\x00', 0x0) writev(r10, &(0x7f00000003c0), 0x63) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000280)={0xfd, 0x1, 0xc6e0, {0x5815, 0x712b}, {0x7, 0x3ff}, @ramp={0x0, 0x0, {0xd60, 0x8, 0x9}}}) pipe(0x0) epoll_ctl$EPOLL_CTL_DEL(r9, 0x2, 0xffffffffffffffff) keyctl$describe(0x6, r8, &(0x7f00000000c0)=""/83, 0x53) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r11, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:39 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x2d) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f00000003c0)={{0x0, 0x0, @identifier="df815500272f132235bcdab6c4cc5b67"}}) syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r5, 0x400, 0x0) close(r5) sendmsg$can_raw(r5, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x0, 0x1}, 0x16, 0x1, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0x2000001c}, 0x20000000) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000440)={r7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f00000000c0)=0xde1b) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000280)={r7, @in6={{0xa, 0x0, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x20000, 0x0) setsockopt$bt_BT_POWER(r8, 0x112, 0x9, &(0x7f0000000340)=0x80, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001b00)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x5, 0x4, 0x3, 0x10000, 0x7}, &(0x7f0000001bc0)=0x98) sendmsg$inet_sctp(r3, &(0x7f0000001d40)={&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x3cc94538, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9b3}, 0x1c, &(0x7f0000001a80)=[{&(0x7f0000000740)="e36a4958a4caec1c14798c9fad47c1884484e60784467a4109adfa222d385e640f2eea59362320cf678396894e92c816d076b1d99e069adae01350ccea8608e962300d7bc96efcff179a4079520992599985ea67e8ffe25123ff0f003c7ed0f1d65396e99aaccb0848916acf92518d0c493886055e9863bfe345b42503805389e5afbd1f7d94a760bb0d3ecbe23f0f875f6d0fcec265a59cb79892e91176d583f72d75832886424b9464f6074108b157306fffbca0f1506660abb2569c669e11ed2ae38fe131c2f36369febdde81072a554ca05279bbefc9fcc6d417c59e27fa20d9504b6310", 0xe6}, {&(0x7f00000008c0)="76f5615c727abd9b0e673d8a54e87dc33296c5c7c69bfc0f58cadd620f2d7cb89eeedf998c9ea4094dddbf29d311fabbadff22bd1c08da3e51e83fdd2a3db156c70d8890d41c645fd0f38b0dec0237b8beb2fe4f896342a3f2809721508098986b0bbce1820036aac4264f216442c4cda44dcd8c13fc095f52dc6c08531a8a7ff036e1d408c563fe4214e24cbe0f0bb3904e64150956338505288ac17adf25632f838bd3dfd5319dc9319ab1e67cae31281b63a12a01975e2b1a5e4eeb7b01", 0xbf}, {&(0x7f0000000980)="3a70b0be659c00391346baa8aa51beb73f0151c53876f5a5cb40d3aa074ce5d1a03ffcf0f303ab81d65ecd086ee91ccddaf627a8657b42dde76cf1e7f01073888dda81f9f028391ae957cba32ad1a2e13eba013c67d9af87f3dc389ba90607b67dcc4b0d153e1905c4008f478ce1c7ccd938cfafbf7370d174487865d9108c23b0fc5b22a2b51e65390bc7b0459ab8f71b045a421963766a34055ff5949152439c6537884693c7f290985ecf51896fbfa1a67c2fcc3ef356901fb4b6d0d117ddd4d2eaac5fc8429791910cd36d13649ff401529d6cc4b94f52ae2ffd1f9312fe5e32d86ffbcf3d9dba73d2f0b5a85b5cf80efb65187d312d27a2f2ee2d0562971a20411b52febed6cdb5eb5219123f2d28c952e18158ff6938d0243cb0d4a60b58927a0db40172bb7ae30571d2026cbe21eba20cace9679ba202cb11d4922c34afef6bdd0190400c1d4d052536473215a737e529b4a2a739771b0b32ae3164b7bcc932d20bcff2b49470a0185f0237f1d59b8913c0e17f1f9440a4cb9d48fa8e31c2e4b1d20dc5954b13e8536e23b73f4b8263f8a874929921273fb26fbc8f1a548d7e17de27cab3f589edddb9c627180a630034989e5da5549fc6db87f0784e582e4520391a1cb2806430ae727dd03a9af0dbc5ebb1b18274bbcebd293521ed30c81db6fc3db8455d3fb066b5dd45104ee7961a12ee50d4bf0af46a8921b4173e7b0e3210dda4814e8be4b7bcd25330242e1c4a7ba4db2adf20cf76d109492101318eb5e0c36de2b6f6e030f040230b2061e8ae92ba29fd7cf4c22bd40186f79201c1d4aa751a024c897f7942fdad8fd6d9f1023b2cab9f5b09c90776398c6c8558f64bc6b4dcba8032c3b6836ce9a4b80d8e6a480074bdf5671ba86544d3d831d28b7d176c62557d614912b5ba15d585586a4a2c15ebac013cfad864e1ab4519cd7c5320e28f7cf1edcb6a84129dcdd556cae5f08dafbe902d2497e3c17da5e456701673b1a422a5e3e752bc4fbd518628de0493a9eb91fbf9c90abfffa08036f6127e7a0a16ea8e3c6b1457e22d3df18a0b371a72a8ed4abc3544f70821e2768670dcaddae0e06c1dda46f4f8e055bebaabdb70043434a00342b488d3b027020eda7b13bd3c6cbcebf33d8936a93e2254cefb799912c090e5f300c3033f813df8d1e47ecf57e4704fe578d42f5e7e068d67d952dca241a43f77ad7fa594c8af17f44301f9037855475be219b566b435d73a77a4c51e148ba56e738a2a774136331a436cbbbcefa1fbd8eeabd102f5c3d4df37667e07055749731ea5e1efc4c4f0366cda6d2209fa0762311f96f6537cfef730f6c71c0697fd1f799be9ca59960728d6b5e342432f314683991bb353406e6a31f7f2d0396349ae859ab7deee146bd9b112583f36a4e34c372d763eec039aefbbf30da33712cdefdbd0e7fc81cb70a2e95fe4269e76379aee0a1f202c4577ba097b0b7f348033f961366d46398403dbe4f58db7b499d1b2b532590d4b18ded4c62cc440b1288ba91d72ab23d907400acb3932de6f00414ca9dd09148d69d413e4d2cea417ef65b96e9988479dfa14c077b7f65df1cd89f63380d2d5b9f6cb6270e8dc24e29825bd2deb63d668e6c48c1a3b11a8d40a6cd55fb4ae3598a31fe1acfd95b838e36426adf031c994f685a989ad8180548fd7c2b51b5271c59db5f37199850d7d13c30ed86bac027cab734abde5d3829c385bb3a3e6848d8366257170d62aa137aa4ad9abc76df3e525cceb819d5a474e9bad5c643faf8c63477fb506c6fe0541729fbbb019d9bb58b97fee109e82899425dd3774ee6eb4d1d7955693770ea2b6cc9acf7db088c40583b58d2dba202e24176785b6b1f3becd6262076f8ee01eb2ad62db71b4d2d944422b5c4ed042afceee949f01ff9fe815641377243ee11f282c358543b2ffeb8a13d9b1c0beb2af1134c9acae677ade0558a5f0307ceb2bfef5103e7f0730fad7c7d147752e2448e0cd8b63476394a1f9bcb5c006b34dd238bafe6c9962f32f739074035f7c557a2988c8dcfbdc4fb0cf225d5efb654fc225930784425ab01b21dc92f8f46b9cfe62c56ea5278ed1613853e5eaee8303e70e41a7ce3ecd5dc6c3b78068dd2c921942328339847dca62b7b9040452ffa5609f970ecb02452e7351537deb9074e8070048d4d1db47102c3857b0b0e5d8ba8821924557d35db8c74bd9006b0b76b951d1e8121e689963db0473ede784208b59916ec6ed1f6d8fe2d3383b141ac7cd17c295fa9a09e7f3beddde31e74f5c737ac19bdd6f70e8fb21b38606fcd609647f9560c7249062d22c3101cee22dcc3de62f442e2ae21badb363083389e5bd349fc4cfa7c570d9157c13b69b97733a6ed6716c77a8d5f2876ea839c780fa3892bdd27a06a84aa276819848a459d52e206c698f4237768324edaae4e2d515f1c34190af8a3a0415306911ec3f02e0d08f7e9688839c918a653a47fde00025002bd8f27b170683ec03f569e2992d6673e4cbfca658302ab5475f583c628eb1d380f9ef765ac4e655b6f3110646ee851681661ac456ad3c87498dd8aba16d95b85a57c17c45e83d58ea3c2e714b70423517f0fc1cc1bde5d58c4800d15f6f84df67daf53ecb2b2ccffaf32a52ee42da18cd0e896251abb4e3a34b775ccd4185d1e508a09fd3515ede9dcdf949dc9a74e5ac1b4c302f44d41827d7afe68ffc9d4dfa62fe97cae4dcd6da7a15c510a218c6dbe64d27ab187a43b25abe3e12ea67b6e93cc4050c78a875da9dd2bcb1ebbedb58bbea07ff4a5a4a8d019472f9651787de32a0323bf09ef1622a4550d51351011cc136a0ed0a42350f0731e234b4300519704c22ebca00262c5ff6fcbde6b473d26492f1e8b069761c7786dee5f9aabbed0e53c583540d79661781b59a5ef40195a58cf6fb9d1f9670d8cfa3ff3a5a2114e42b896a7d3c0ee882e0be968ff099a06999684a84b69a1eaef3afda299dd44e5a228056463bb038430205d5b16f2a3f07720309cd705a434b46a73e7fb6c220ce565e332df2c510dca2280db21a405a079ae5f6a6af17a6e9a7f9b5e7102d377e035e4e98de38f32c4b9dce141c29a78bd1c584ea526bb9adb351da2a6ae5dd9e7c48c1b4006d019039ef256146db31abd8a1757c61a4978e23d9b987f5235bed1cb12c90ad2c76be0363552631556d0e76cf5d1e0b4ca4c53379dabbd085a0e190dd665ee358b122becd79a8ef9fdb8adcc4cbc1bc8895d598be7db71f4631a4de99993252e0f7b4bf2a38bb27cb27579d95fdf9d7316610fb648bb04fb7422655173100b24fff81c40fa6df0be9a0ab6cae25fb08a248307fc0bebc8f1c7192e4b16fcd71b99088908cdd409d82a04b007bb080fc820f908064938684ef232f7ecdc7ef22274e54528d96c39538283a92ad0c6fb53c52e8874395a26a75971b83e0ce34fe9953d55af26af71c281d339ac51c346e6b80f4fdaa0c53f384049dca9df0b1b94d5fe3ffa293b44338f46700cef37698a4b879ed0631aa332ce3d14aabf3d35bff7290d7ff732d6da13fa71e4cf601a9d40426a5925ff3742bb86ca540b439f5e6c6ba8b441cf281ac6cee083bf5e0a196b26f61d0b7e15ed9db9f90e83d73369725679149aa3b9377021cacdee3f37ce0e28c27b98f504205fdc889d8869bea3a5cac60d177dcb16c7879c743217435c2573064f9c3d7e42459edcd5878262235013f2c3da7723061800484cc61d9448d311666768587fb8b90f31183cfbdf9629991461bc387871a95b025796ae78693ff1ef851c8f0e5aa1c54c4fc2a497d9ebe32a61ed3863b0ade3184ce6484ce1d474785341c07cc6a8240b3f00c57e5a6ae83fad25c7b7d328c76a0d46b610cfc99a58b3d214a7763064bc633fbe53ba8805ba1fab84bea8e347eb64052a2eb02e8198a8ce6845aa41f42066ce4d4399d0050c373a67c1d1cb78a312a2a07a5ae937a0c656f86d85f4be936caf0f64da326eb5f8632febc8f84b44105659e17ce2649414ad19f5fef651eced86e9020f39fe5f07ce0c1a5b0147497e6f792e88fff8f263b8c4862524d08562da104cce6e515fedea1b376c0af36b1981935aeb70a9afdaaf5c7b961065f9d1dffb4b93c42f0419e31ad5222e22d890e7da7ef607395f5d1cc123fca41eac757791c368514c42d9f30d3da86558903eaf833ebc6ce3ef365da62a2ad9dc3e2f49cd53e5fa5d8d36275b9896cb582bc647108d9f4372fe78d58e16ba0610a4468c38e895a51eb332101b782a09e99f8d2a3b1218e90089e379d23c182aab75e8474513c3ed8430cf58403ac78d8ba0822a1533fba91fdfad0c79a0021b9822721dce4540492931ca019b2bfccc74bb72a40889a061c13f19131662b9f60ce5f35d9c09d895ffd48b4773e409e97836ac5da186425194478507054ed5e1cb9b54c20ec78ae4a8bd3422d0ef4cf4156444c0e439a7e5646e5b5bfff8c525f3f1eee0c50cdd41f9ce3a7e6893ebb7eb23d80117c959bc969aad1ee74b350ea6b060faa67e14c0dd4666dae7d7fb743082ee8cbafdf8db678bdf17615f8347322e17b101b68ed05fb7b9bd80ac423b1229044cde1636f760b4f59ea70441a60c6068b226b6b72867d4aab15e0fc00518784ae4f4a218878493cfb12e6619ff46395231b214fe0c1372671bdd82e9fb42e85c309436e83855d7828fd506d2eb88bab147986faee3d8bcf574b44cc8c985a569382e8e1edaa1dd13eea9116c6178d7fb30f7c311a61bd0eaadd1cf45f1d170fb2d8c4c386a2e98a2f39d2e260e19df04f9a13b56575ddb81fcc8d71a5e94de4e053c59b0c2956f042c9056d3fb8782035435ce6c06ab6cc18b47b8f1106a144838d231ef41d61e6b5464578a4da4c8bac1032703481b9e68a939424c7c48252fea192f7e1db330ff2b511d0cdc09a36cfec9896c4a2b4575fa4edd6a76a25bbfab1bfd2738702a57062916cca824e3f8ff9871da560b7aa81063d932648e9d5833311ccde087b4f16bd55aa3deb18defecb85cf354da5e96dcfed6cb628f74d8e5707e71e1eb49c00d46085cc639623229947a3135c59c0ede187bd23b175f01c1c537b311d25192838b7e52e97dcc21a210b4232d9dd3fd2f56d31b45f10602264310ac12200f4abcd9e9e9e177c9c840314039bc9afdf0f32e54aba1ae9c092a2d9ce466270ad7fb9cdae2b27116fc1c4a7ca2e9f45f60af588d2358b70a260bedd6203d45b48fe7ee01bf0e066d61e442aac7df266155ef387e31028441265c475588978fa0a56df80f3408179ce72ea1941416caf763c00aae0122304e744138616ed0b886a165f313f35e78913c74a7f93f20f6aaa8bfaa04deb7dc0cf510c8e23e70f0a8999f5b98d7e924ef87feb145dd9b26ee8fd943d0cee451901aaadab1386ae0b965f82c721dfd909735ea9c0f4ec199a4f740b988337eef3dbf003fcb7191eabb2ab5e25a11deab800128787c601af68d02f0934b836b51c8b12644294bb7c15d952b8560c2617f4337b43b412cbf94972b283fb3e53cd9d3fa5c8719889f941d7dc5fa0140346c6fd3a189dc80bd232c8f9c4865a46857ea4f2a9a595744b7184e19b0b4eeac20b23b2dceff8c4c1e206251a723f3908ef18afe307b14f677c954f30d6e8c4ae1894ac797adace673119d6e35025dc8e6659213886266a975cf13f426eea998a433a2aa0fa4780a3d8a01f92ee4246d72c0da1ea6873b053f620f1d172452738086ddf847cc2a4a1f6941c2d19815100e44c9a12e2f6390dc161", 0x1000}, {&(0x7f0000001980)="0acc897be9ee424370b63b056a3b4c586f8c059404251e7c337befbf0bb106776306852d83d47721a217d0c92cb9e8f14ce906bf3b33245466ce7cfe7e8e84b472a44f941a57983478e2606582a83f250d341e65838a832bd230809549461209c7a1eaf0bf", 0x65}, {&(0x7f0000001a00)="84f4e2ba2eb8631dc3c67837e21a8d94cee631ec5b00b0a9b4f1234898c5feecd86e528b43794ecdbfadfa222e88e3e7b11bc4b58dd3c4b91156b5a4741bc3e6a37afe468cc8347b9103ae6eaa378647c03d3e14b1d3a3927c4deefe271dc902b4c6b08e67e7c714a47509", 0x6b}], 0x5, &(0x7f0000001c00)=[@sndrcv={0x30, 0x84, 0x1, {0x7, 0x2, 0x8000, 0x4df, 0x80, 0x79, 0x1, 0x5, r7}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xffff, 0xa, 0x5, 0x0, 0x3, 0x6, 0x8, r9}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0xfffffff8}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndinfo={0x20, 0x84, 0x2, {0xfff, 0x3, 0x1f, 0x7f}}], 0x128, 0x1}, 0x40000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r7, @ANYBLOB="0a7eea1b060006005595c0c331783a3d5c"], &(0x7f0000000100)=0xc) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r10) 07:28:39 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 607.060645] QAT: Invalid ioctl 07:28:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xfffffdfd}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) [ 607.112401] input: syz1 as /devices/virtual/input/input274 07:28:39 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:39 executing program 3 (fault-call:3 fault-nth:0): add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:39 executing program 0 (fault-call:12 fault-nth:0): r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 607.308368] QAT: Invalid ioctl 07:28:39 executing program 2 (fault-call:8 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) [ 607.335603] input: syz1 as /devices/virtual/input/input275 [ 607.396581] FAULT_INJECTION: forcing a failure. [ 607.396581] name failslab, interval 1, probability 0, space 0, times 0 [ 607.447339] CPU: 1 PID: 1345 Comm: syz-executor.3 Not tainted 4.19.85-syzkaller #0 [ 607.456238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.465753] Call Trace: [ 607.468376] dump_stack+0x197/0x210 [ 607.472041] should_fail.cold+0xa/0x1b [ 607.475972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 607.481215] ? lock_downgrade+0x880/0x880 [ 607.485429] __should_failslab+0x121/0x190 [ 607.489864] should_failslab+0x9/0x14 [ 607.493684] __kmalloc+0x2e2/0x750 [ 607.497289] ? kasan_check_read+0x11/0x20 [ 607.501740] ? bpf_test_init.isra.0+0x95/0x100 [ 607.506332] bpf_test_init.isra.0+0x95/0x100 [ 607.510754] bpf_prog_test_run_skb+0x11e/0xb20 [ 607.515341] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 607.520202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 607.525739] ? fput+0x128/0x1a0 [ 607.529066] ? __bpf_prog_get+0x97/0x290 [ 607.533130] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 607.538013] bpf_prog_test_run+0x129/0x1a0 [ 607.542275] __x64_sys_bpf+0x397/0x4c0 [ 607.546188] ? bpf_prog_get+0x20/0x20 [ 607.549998] ? do_syscall_64+0x26/0x620 [ 607.553972] ? lockdep_hardirqs_on+0x415/0x5d0 [ 607.558555] ? trace_hardirqs_on+0x67/0x220 [ 607.562897] do_syscall_64+0xfd/0x620 [ 607.566713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.571900] RIP: 0033:0x45a639 [ 607.575096] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:28:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xffffff8c}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:40 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 607.594404] RSP: 002b:00007fb7a238dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 607.602118] RAX: ffffffffffffffda RBX: 00007fb7a238dc90 RCX: 000000000045a639 [ 607.609401] RDX: 0000000000000028 RSI: 0000000020000040 RDI: 000000000000000a [ 607.616679] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 607.623943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7a238e6d4 [ 607.631436] R13: 00000000004c0bdd R14: 00000000004d3688 R15: 0000000000000004 07:28:40 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x800]}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10001, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) 07:28:40 executing program 3 (fault-call:3 fault-nth:1): add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 607.769268] FAULT_INJECTION: forcing a failure. [ 607.769268] name failslab, interval 1, probability 0, space 0, times 0 [ 607.839995] CPU: 0 PID: 1355 Comm: syz-executor.2 Not tainted 4.19.85-syzkaller #0 [ 607.847791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.857182] Call Trace: [ 607.861128] dump_stack+0x197/0x210 [ 607.864815] should_fail.cold+0xa/0x1b [ 607.868755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 607.873990] ? lock_downgrade+0x880/0x880 [ 607.878219] __should_failslab+0x121/0x190 [ 607.882494] should_failslab+0x9/0x14 [ 607.886334] kmem_cache_alloc_node_trace+0x274/0x720 [ 607.891469] ? mutex_trylock+0x1e0/0x1e0 [ 607.895613] ? perf_trace_run_bpf_submit+0x131/0x190 [ 607.900743] __kmalloc_node+0x3d/0x80 [ 607.904561] kvmalloc_node+0x68/0x100 [ 607.908427] alloc_netdev_mqs+0x98/0xd40 [ 607.912548] ? sl_free_netdev+0x70/0x70 [ 607.916537] slip_open+0x38e/0x1175 [ 607.920175] ? sl_change_mtu+0x5c0/0x5c0 [ 607.924258] ? lock_downgrade+0x880/0x880 [ 607.928415] ? sl_change_mtu+0x5c0/0x5c0 [ 607.932569] tty_ldisc_open.isra.0+0x89/0xd0 [ 607.936988] tty_set_ldisc+0x2e3/0x690 [ 607.940884] tty_ioctl+0x65e/0x1510 [ 607.944521] ? tty_vhangup+0x30/0x30 [ 607.948236] ? mark_held_locks+0x100/0x100 [ 607.952489] ? perf_trace_lock_acquire+0x380/0x580 [ 607.957426] ? __fget+0x340/0x540 [ 607.960936] ? __might_sleep+0x95/0x190 [ 607.964917] ? tty_vhangup+0x30/0x30 [ 607.968649] do_vfs_ioctl+0xd5f/0x1380 [ 607.972547] ? selinux_file_ioctl+0x46f/0x5e0 [ 607.977049] ? selinux_file_ioctl+0x125/0x5e0 [ 607.981548] ? ioctl_preallocate+0x210/0x210 [ 607.985960] ? selinux_file_mprotect+0x620/0x620 [ 607.990727] ? iterate_fd+0x360/0x360 [ 607.994549] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 608.000089] ? fput+0x128/0x1a0 [ 608.003382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 608.008922] ? security_file_ioctl+0x8d/0xc0 [ 608.013346] ksys_ioctl+0xab/0xd0 [ 608.016814] __x64_sys_ioctl+0x73/0xb0 [ 608.020707] do_syscall_64+0xfd/0x620 [ 608.024950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.030139] RIP: 0033:0x45a639 [ 608.033345] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 608.052266] RSP: 002b:00007f38ad3b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 608.060358] RAX: ffffffffffffffda RBX: 00007f38ad3b6c90 RCX: 000000000045a639 [ 608.067630] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000006 [ 608.074908] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 608.082187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38ad3b76d4 07:28:40 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:40 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 608.089471] R13: 00000000004c52d0 R14: 00000000004da3f0 R15: 0000000000000007 07:28:40 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x6e, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:40 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:40 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xffffff97}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:41 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 608.308094] input: syz1 as /devices/virtual/input/input279 07:28:41 executing program 2 (fault-call:8 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) 07:28:41 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@initdev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) r3 = getgid() fchown(r0, r2, r3) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x118) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = dup(r7) r9 = dup3(r8, r7, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r6, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:41 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:41 executing program 5: ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:41 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:41 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 608.708467] input: syz1 as /devices/virtual/input/input281 07:28:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xfffffff6}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:41 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:28:41 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:41 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000002]}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r1, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000000)={[{0x57, 0x7, 0x9, 0x2, 0x1, 0x5, 0x9, 0x2, 0xe1, 0x80, 0x1, 0x8, 0x1}, {0x80000001, 0xdca9, 0x3f, 0xe0, 0xff, 0x7f, 0x0, 0x81, 0x3f, 0x38, 0x1, 0x1, 0x5}, {0xe3f, 0x3, 0x6, 0xfd, 0xf8, 0xff, 0x96, 0x9, 0x81, 0x80, 0x20, 0x99}], 0x3}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_mr_vif\x00') ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000000c0)=""/84) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x1f3) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000140)=0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 07:28:41 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:41 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000000)={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @rand_addr=0x3}, 0xc) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 609.098056] FAULT_INJECTION: forcing a failure. [ 609.098056] name failslab, interval 1, probability 0, space 0, times 0 [ 609.177298] input: syz1 as /devices/virtual/input/input283 [ 609.229411] CPU: 0 PID: 1685 Comm: syz-executor.2 Not tainted 4.19.85-syzkaller #0 [ 609.237187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.246549] Call Trace: [ 609.249173] dump_stack+0x197/0x210 [ 609.252895] should_fail.cold+0xa/0x1b [ 609.256785] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 609.261904] ? find_held_lock+0x35/0x130 [ 609.265969] __should_failslab+0x121/0x190 [ 609.270200] should_failslab+0x9/0x14 [ 609.273992] kmem_cache_alloc_trace+0x4b/0x760 [ 609.278594] __hw_addr_create_ex+0x5e/0x310 [ 609.282914] __hw_addr_add_ex+0x1ef/0x2b0 [ 609.287061] dev_addr_init+0x118/0x200 [ 609.290945] ? dev_mc_flush+0x40/0x40 [ 609.294742] ? __kmalloc_node+0x51/0x80 [ 609.298713] alloc_netdev_mqs+0x142/0xd40 [ 609.302879] ? sl_free_netdev+0x70/0x70 [ 609.306854] slip_open+0x38e/0x1175 [ 609.310496] ? sl_change_mtu+0x5c0/0x5c0 [ 609.314567] ? lock_downgrade+0x880/0x880 [ 609.318713] ? sl_change_mtu+0x5c0/0x5c0 [ 609.322775] tty_ldisc_open.isra.0+0x89/0xd0 [ 609.327178] tty_set_ldisc+0x2e3/0x690 [ 609.331064] tty_ioctl+0x65e/0x1510 [ 609.334945] ? tty_vhangup+0x30/0x30 [ 609.338654] ? mark_held_locks+0x100/0x100 [ 609.342903] ? debug_smp_processor_id+0x1c/0x20 [ 609.347572] ? __fget+0x340/0x540 [ 609.351025] ? __might_sleep+0x95/0x190 [ 609.354994] ? tty_vhangup+0x30/0x30 [ 609.358700] do_vfs_ioctl+0xd5f/0x1380 [ 609.362597] ? selinux_file_ioctl+0x46f/0x5e0 [ 609.367138] ? selinux_file_ioctl+0x125/0x5e0 [ 609.371632] ? ioctl_preallocate+0x210/0x210 [ 609.376033] ? selinux_file_mprotect+0x620/0x620 [ 609.380789] ? iterate_fd+0x360/0x360 [ 609.384584] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 609.390121] ? fput+0x128/0x1a0 [ 609.393399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 609.398937] ? security_file_ioctl+0x8d/0xc0 [ 609.403356] ksys_ioctl+0xab/0xd0 [ 609.406815] __x64_sys_ioctl+0x73/0xb0 [ 609.410696] do_syscall_64+0xfd/0x620 [ 609.414495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.419686] RIP: 0033:0x45a639 [ 609.422872] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.441777] RSP: 002b:00007f38ad311c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 609.449574] RAX: ffffffffffffffda RBX: 00007f38ad311c90 RCX: 000000000045a639 [ 609.456854] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000004 [ 609.464139] RBP: 000000000075c268 R08: 0000000000000000 R09: 0000000000000000 [ 609.471433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38ad3126d4 [ 609.479967] R13: 00000000004c52d0 R14: 00000000004da3f0 R15: 0000000000000005 07:28:42 executing program 2 (fault-call:8 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) 07:28:42 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xfffffffd}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:42 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:42 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) getpeername$netrom(r2, &(0x7f0000000000)={{0x3, @rose}, [@remote, @bcast, @bcast, @default, @netrom, @bcast, @default, @default]}, &(0x7f00000000c0)=0x48) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:42 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30008000}, 0xc, &(0x7f0000000300)={&(0x7f0000000080)={0x14, r8, 0x1, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x3080}, 0x20088000) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, r8, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:42 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 609.728819] input: syz1 as /devices/virtual/input/input285 07:28:42 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x40000, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r1, 0x400, 0x0) close(r1) sendmsg$can_raw(r1, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x1, 0x1}, 0x16, 0x3, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000440)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0xd0ec, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000006c0)={r3, 0x7ff, 0x3, 0x71}, &(0x7f0000000700)=0x10) r4 = socket(0x2, 0x803, 0xfb) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) r9 = geteuid() setreuid(r9, 0x0) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x83, 0x5, &(0x7f0000000640)=[{&(0x7f0000000340)="c5e1de983edb6872f123f46253f344fc537dd39fb0542655ae56133a482aabd325e8d91883a2c227d161e5f4d14b8e19828344d5e1ec99cfd346b8d72661a3c5578070c9c133a826adb57eddbdd9529c7fe08989763c0e3a399a4e657179a420ab68001c4ef702272f95fb67d0ef5012aac1a31c39aaaaf669ccd67eb02f06d42c529b03c98ca21475c1259dd6cfe7c1d3cbdfe78c8ba7c0bbfdf8a2100d9ce5b091d95780c29df3", 0xa8}, {&(0x7f0000000280)="dd0bc6ff9f4d176602b8fb7359f409c5ef621ec7bdce4c86f0f41f807fd79c69503144a0bce185314621d424e1c8bb970900697d379812ba837f2b87", 0x3c, 0x7}, {&(0x7f0000000400)="c61cf49994852684d6354b221c406fcd21916ec35314be8902cde67782f7a80d091ca2c8a0c1e10ccc4a7dabccbb88fdd8ba957892db5be0d42a3fe63da07aab91", 0x41}, {&(0x7f0000000480)="60e4a7c738a29e08763c49ada538050004d84674edb412c4c798910ef9fcaea9cef1cb5a260d9401d3534f520aefa6feadaa7e30028f57b0cec6ae1791ce967a38b4c80de97bd99d9a13660f61a5e26a37b7bc8b6f9cc98f7607f80ff1da6a88fffbedc24950e81be19e79c08da0014310040a82cf13c27ce0f6f145bea807a125188d74c65273473fd5379a0ef4a5bdc4e0bc02877513809f02b60dcea7556e005c6179e0663d2b0befb1ff45fd7fda9ad0142d1429f259415fe672df0173", 0xbf, 0x100000001}, {&(0x7f0000000540)="ef380869c33134b9ab728c939730a979113d739eae7c986556b9544ea96c27b45cc852a3f9ead3090597da0f7460b1ba9cb245af0148743983b0c096bbb1ece70d5071f97f59cb4002202dae1105655690e91f0d0ff60aaf0fb6800b55cc4c509f300b8231ee5f029d12ee1ed8f9ad4555f9a8fea81d2aee29597ea319dca7db5290ee7f7977c367c6c6cd4b902e50ba8a34e23a56197d09ccdb7d140cdf668bc21f2ea6c470b8286152976da2d3da5e57f0d9b35adc0573bcb424b6eacf301173e21d21daba0fd791752b3736696eadf2e9cba067e47255eccbb4e8552378dc0d42162ccef4442c3ee81d3445c04dcab6b3b06c", 0xf4, 0xc4}], 0x202004, &(0x7f0000000080)={[{@map_off='map=off'}, {@check_strict='check=strict'}]}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000eb0000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r11 = dup(r10) r12 = dup3(r11, r10, 0x0) setsockopt$IPT_SO_SET_REPLACE(r12, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r8, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000740)=""/56) 07:28:42 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b705000000000000720a23fe000000008500000012000000b70000000000000095000000000000004e625894684e890d31ae451306371a0a5447a801b8c1fe0209c4f0c4bf97e6555e61345400f9bd42abeb9adeb279f797013ea9c1a21902ff075436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca23b944477bebbe8282f07a95d767437a397bf8f50e80bf946e7dfd876bffc402887781979461c43000000005c79435883df6c10ce86ff860971f2a5405e453228e7b1005bd73479358a90df3e481947de646e736aa572158af6ea63d6d418fbbd2bbae4f7a39d1da098ef78dffcff5e1ed19913a5fb25c79dac2e489f681278926581f9e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517e92c26637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024fbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6a18438e2357a9c1e0609b2bec5003d6f41e8ed4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb822e202222c03fa84ccc3cfe7171094018630366397266090212343aedfbf7afe89c2eb775b0d828e3da222eee3b64ed00c7635738015a43ecac66d80810da0e23b501dc7eb084c9a8391fd3efa514a3c0322465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa4602c54401a76406f0718d4efd10afa938af5304210d1b676b378a5879e47941de1a28c3a8f4be28628bd443537d0e032b7d2badd0bc6617a859b7ac272b634135ecea6f43291829030f06cc0c10daf6a275daf5db2dac70b0fedb05e68d56401d1e73ce6b144503d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e88071aaf79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249674b08f7b718f6e32eaa50c178fdeeae7e57a6187122e0af9c41df2eee004a694cf3c3188a83f24594d30ace74e917a8c254d9bcf3b4731b6bda2757a7d79456c9fc00"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, 0x40) 07:28:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x1000000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:42 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000000)={0xe, 0x1, 0x7fffffff}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x31802, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000880), &(0x7f00000008c0)=0x4) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x2, 0x0, 0x1000, 0x1}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r3, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='/dev/uinput\x00', r3}, 0x10) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r5, 0x118, 0x1, &(0x7f0000000140)=0x5, 0x4) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 610.130000] input: syz1 as /devices/virtual/input/input287 [ 610.259627] input: syz1 as /devices/virtual/input/input288 [ 610.294860] FAULT_INJECTION: forcing a failure. [ 610.294860] name failslab, interval 1, probability 0, space 0, times 0 [ 610.308351] CPU: 0 PID: 1868 Comm: syz-executor.2 Not tainted 4.19.85-syzkaller #0 [ 610.316107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.316118] Call Trace: [ 610.316146] dump_stack+0x197/0x210 [ 610.316177] should_fail.cold+0xa/0x1b [ 610.316204] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 610.316224] ? lock_downgrade+0x880/0x880 [ 610.316262] __should_failslab+0x121/0x190 [ 610.316281] should_failslab+0x9/0x14 [ 610.316295] kmem_cache_alloc_node_trace+0x274/0x720 [ 610.316315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 610.316334] ? dev_addr_init+0x17f/0x200 [ 610.316363] __kmalloc_node+0x3d/0x80 [ 610.316388] kvmalloc_node+0x68/0x100 [ 610.316413] alloc_netdev_mqs+0x67c/0xd40 [ 610.316435] ? sl_free_netdev+0x70/0x70 [ 610.316456] slip_open+0x38e/0x1175 [ 610.316481] ? sl_change_mtu+0x5c0/0x5c0 [ 610.353565] ? lock_downgrade+0x880/0x880 [ 610.353598] ? sl_change_mtu+0x5c0/0x5c0 [ 610.353621] tty_ldisc_open.isra.0+0x89/0xd0 [ 610.353641] tty_set_ldisc+0x2e3/0x690 [ 610.353666] tty_ioctl+0x65e/0x1510 [ 610.353689] ? tty_vhangup+0x30/0x30 [ 610.353705] ? mark_held_locks+0x100/0x100 [ 610.419819] ? perf_trace_lock_acquire+0x380/0x580 [ 610.424762] ? __fget+0x340/0x540 [ 610.428228] ? __might_sleep+0x95/0x190 [ 610.432202] ? tty_vhangup+0x30/0x30 [ 610.435919] do_vfs_ioctl+0xd5f/0x1380 [ 610.439805] ? selinux_file_ioctl+0x46f/0x5e0 [ 610.444300] ? selinux_file_ioctl+0x125/0x5e0 [ 610.448797] ? ioctl_preallocate+0x210/0x210 [ 610.453206] ? selinux_file_mprotect+0x620/0x620 [ 610.457974] ? iterate_fd+0x360/0x360 [ 610.461774] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 610.467321] ? fput+0x128/0x1a0 [ 610.470638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 610.476206] ? security_file_ioctl+0x8d/0xc0 [ 610.480803] ksys_ioctl+0xab/0xd0 [ 610.484274] __x64_sys_ioctl+0x73/0xb0 [ 610.488168] do_syscall_64+0xfd/0x620 [ 610.492064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.497288] RIP: 0033:0x45a639 [ 610.500525] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.519590] RSP: 002b:00007f38ad3b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 610.527335] RAX: ffffffffffffffda RBX: 00007f38ad3b6c90 RCX: 000000000045a639 [ 610.534638] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000006 [ 610.542067] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 610.549359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38ad3b76d4 [ 610.556648] R13: 00000000004c52d0 R14: 00000000004da3f0 R15: 0000000000000007 07:28:43 executing program 2 (fault-call:8 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) 07:28:43 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:43 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, 0x40) 07:28:43 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = dup(r4) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) r6 = dup3(r5, r4, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0xedc000000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:43 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:43 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc}, 0x40) [ 610.859128] FAULT_INJECTION: forcing a failure. [ 610.859128] name failslab, interval 1, probability 0, space 0, times 0 07:28:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x2000000000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:43 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xdc}, 0x40) 07:28:43 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000080)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x24) r6 = dup2(r3, r3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = dup(r7) r9 = dup3(r8, r7, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r6, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 610.962239] CPU: 0 PID: 1930 Comm: syz-executor.2 Not tainted 4.19.85-syzkaller #0 [ 610.970020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.970034] Call Trace: [ 610.982052] dump_stack+0x197/0x210 [ 610.985740] should_fail.cold+0xa/0x1b [ 610.989677] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 610.994829] ? lock_downgrade+0x880/0x880 [ 610.999033] __should_failslab+0x121/0x190 [ 611.003322] should_failslab+0x9/0x14 [ 611.007167] kmem_cache_alloc_node_trace+0x274/0x720 [ 611.012309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 611.012332] ? dev_addr_init+0x17f/0x200 [ 611.012361] __kmalloc_node+0x3d/0x80 [ 611.025867] kvmalloc_node+0x68/0x100 [ 611.029717] alloc_netdev_mqs+0x67c/0xd40 [ 611.034149] ? sl_free_netdev+0x70/0x70 [ 611.038173] slip_open+0x38e/0x1175 [ 611.041983] ? sl_change_mtu+0x5c0/0x5c0 [ 611.046089] ? lock_downgrade+0x880/0x880 [ 611.050286] ? sl_change_mtu+0x5c0/0x5c0 [ 611.050313] tty_ldisc_open.isra.0+0x89/0xd0 [ 611.050334] tty_set_ldisc+0x2e3/0x690 [ 611.062709] tty_ioctl+0x65e/0x1510 [ 611.066348] ? tty_vhangup+0x30/0x30 [ 611.070068] ? mark_held_locks+0x100/0x100 [ 611.074311] ? perf_trace_lock_acquire+0x380/0x580 [ 611.079251] ? __fget+0x340/0x540 [ 611.082734] ? __might_sleep+0x95/0x190 [ 611.086757] ? tty_vhangup+0x30/0x30 [ 611.090481] do_vfs_ioctl+0xd5f/0x1380 [ 611.094374] ? selinux_file_ioctl+0x46f/0x5e0 [ 611.098955] ? selinux_file_ioctl+0x125/0x5e0 [ 611.103454] ? ioctl_preallocate+0x210/0x210 [ 611.107866] ? selinux_file_mprotect+0x620/0x620 [ 611.112645] ? iterate_fd+0x360/0x360 [ 611.116461] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 611.122029] ? fput+0x128/0x1a0 [ 611.125333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 611.130983] ? security_file_ioctl+0x8d/0xc0 [ 611.135493] ksys_ioctl+0xab/0xd0 [ 611.139058] __x64_sys_ioctl+0x73/0xb0 [ 611.142957] do_syscall_64+0xfd/0x620 [ 611.146764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.151952] RIP: 0033:0x45a639 [ 611.155145] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 611.174441] RSP: 002b:00007f38ad3b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 611.182170] RAX: ffffffffffffffda RBX: 00007f38ad3b6c90 RCX: 000000000045a639 [ 611.189513] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000006 [ 611.196834] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 611.204268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38ad3b76d4 07:28:43 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:43 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x38c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r4}}, 0x284) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="040000050005000000004bb99b07e84162a8817e8dc0980000000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x400405c}, 0x40000) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r4}}, 0xc) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) fcntl$getflags(r6, 0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r9 = syz_open_procfs(r8, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r9, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r9, 0x84, 0x23, 0x0, 0x0) read$char_usb(r9, &(0x7f0000000340)=""/190, 0xbe) syz_open_procfs(r7, &(0x7f0000000040)='net/ip6_mr_vif\x00') write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz0\x00', {0x9, 0x40, 0xe16, 0x8000}, 0x28, [0x9, 0x2, 0x5, 0x0, 0x7, 0x10001, 0x7, 0x80000000, 0x1b5e, 0x401, 0x3, 0x214b, 0xcca, 0x3800000, 0x1, 0x4, 0x3, 0xdfd, 0x4, 0x9, 0x7fff, 0x80000000, 0x8895, 0x20, 0x9, 0xc4, 0x2, 0x1ff, 0x3, 0x467e, 0x6, 0x7, 0x0, 0x8, 0x2, 0x443, 0x2, 0x703, 0xc38, 0x0, 0x3, 0x80000001, 0x7f, 0x4, 0x80000000, 0x1f, 0x7f80, 0x1, 0x3ff, 0x3, 0x4, 0x3, 0x10000, 0x7fff, 0x5, 0x3, 0x74d, 0xcc69, 0x7, 0x4393a0f8, 0x395, 0x3a, 0x10000, 0x800], [0x980000, 0x7fffffff, 0x10001, 0x6, 0x1000, 0x1, 0x8, 0x7fffffff, 0x3, 0x7, 0x3, 0xffffffff, 0x8001, 0x40, 0xffffffff, 0x80, 0x1, 0xa6, 0xad537c8, 0x1, 0x0, 0x7fffffff, 0x6, 0x10001, 0x8001, 0x3, 0x0, 0x9687, 0x3, 0x9, 0x40, 0xc790, 0xfffffffa, 0xd51, 0x2, 0xffffffff, 0x85, 0x1, 0x9, 0xfffffff7, 0x0, 0x6, 0x7, 0x3, 0x80000001, 0x480, 0xc271, 0x3, 0x10000, 0x6, 0x3, 0x7fff, 0x40, 0x3, 0xffff77f3, 0x4, 0x7, 0xfff, 0x32b0, 0x401, 0x0, 0x0, 0x401, 0xc0000], [0x1ff, 0x2, 0x3d, 0x1, 0x40, 0x2, 0x4, 0x2, 0x3, 0x2d, 0x5, 0x80ce, 0x4800, 0x3, 0x1, 0xfffffa4f, 0x6, 0x7, 0x100, 0x7, 0x0, 0x7, 0x0, 0x6, 0x401, 0x1, 0x6403, 0x5, 0x3, 0x1f, 0x10001, 0x25, 0x1000, 0x800, 0x53d, 0x9, 0x4, 0x8, 0x3, 0x0, 0x200, 0x2, 0x81, 0x80000000, 0x3, 0xc9, 0x8, 0xcb, 0x0, 0x0, 0x1, 0x786, 0x20, 0x101, 0x1, 0x1, 0x7, 0x2, 0x7fff, 0xff, 0xfffff3c6, 0x1, 0x25, 0x400], [0x2, 0x2, 0x9, 0x1, 0x6, 0x6, 0x400, 0x6, 0x81, 0xf04d, 0x0, 0x1, 0x3, 0x8, 0x0, 0x1, 0x7fe000, 0x5, 0x2, 0x81, 0x5e61caa1, 0x3d, 0x25, 0x3, 0x7f, 0x0, 0x4e5ae4ec, 0xb151, 0x1, 0x101, 0x3, 0x9, 0x10000, 0x6, 0x3, 0x7fff, 0x1ff, 0x1, 0x200, 0x6, 0x7, 0x4, 0x27, 0x9, 0x1b6, 0x6, 0xffff8001, 0x9eb, 0x80000000, 0x0, 0x0, 0x5, 0x4, 0x6, 0x10001, 0xff, 0x6, 0x1, 0x7, 0x20, 0x8, 0x10000, 0x8, 0x5]}, 0x45c) setpgid(r7, 0x0) [ 611.211547] R13: 00000000004c52d0 R14: 00000000004da3f0 R15: 0000000000000007 [ 611.306864] input: syz1 as /devices/virtual/input/input289 07:28:44 executing program 2 (fault-call:8 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) 07:28:44 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xdc}, 0x40) 07:28:44 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 07:28:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x6b6b6b00000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:44 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = dup(r5) r7 = dup3(r6, r5, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) 07:28:44 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r5, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x8001}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f0000000340)={r6, 0xac, "08dd3eb6ed24032afb788692fa8bfd4a6d297f2e4743c0a07e518d9836514492001d6f44e1315d6a4122309ff94207e0946506c19a637aa6acbe2db1af0403380f018d66c8990db7e9963a438679e881a4962890990d50d4f183c31282790c0f7cf35f12a34073af0452bb58ce207fed8e10697891f7faaec7f469ba0a6712782daf5a415cfdad39a3111cfe5ba5f96e92ce7f6e68dbfb4c4820d6bd73a2eef75a417047195a1be1f2b8d3f3"}, &(0x7f0000000180)=0xb4) r7 = dup2(r3, r3) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = dup(r8) r10 = dup3(r9, r8, 0x0) getsockopt$inet_mtu(r10, 0x0, 0xa, &(0x7f00000001c0), &(0x7f0000000280)=0x4) setsockopt$IPT_SO_SET_REPLACE(r10, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r7, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x10, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 611.621064] input: syz1 as /devices/virtual/input/input290 07:28:44 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xdc}, 0x40) 07:28:44 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 611.754849] FAULT_INJECTION: forcing a failure. [ 611.754849] name failslab, interval 1, probability 0, space 0, times 0 [ 611.802444] CPU: 0 PID: 2167 Comm: syz-executor.2 Not tainted 4.19.85-syzkaller #0 [ 611.810240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.819617] Call Trace: [ 611.822234] dump_stack+0x197/0x210 [ 611.825911] should_fail.cold+0xa/0x1b [ 611.829852] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 611.835005] ? lock_downgrade+0x880/0x880 [ 611.839212] __should_failslab+0x121/0x190 [ 611.843488] should_failslab+0x9/0x14 [ 611.847401] kmem_cache_alloc_trace+0x2cc/0x760 07:28:44 executing program 0: r0 = socket(0x2, 0x803, 0xff) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x15, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b00000000000000000000000003"]}, 0x8d) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup(r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r8 = dup3(r0, r6, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48000084}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) [ 611.852108] ? lockdep_init_map+0x9/0x10 [ 611.856204] ? init_timer_key+0x122/0x360 [ 611.860399] slip_open+0x8ed/0x1175 [ 611.864077] ? sl_change_mtu+0x5c0/0x5c0 [ 611.868168] ? lock_downgrade+0x880/0x880 [ 611.872373] ? sl_change_mtu+0x5c0/0x5c0 [ 611.876473] tty_ldisc_open.isra.0+0x89/0xd0 [ 611.880941] tty_set_ldisc+0x2e3/0x690 [ 611.884881] tty_ioctl+0x65e/0x1510 [ 611.888514] ? tty_vhangup+0x30/0x30 [ 611.892226] ? mark_held_locks+0x100/0x100 [ 611.896500] ? perf_trace_lock_acquire+0x380/0x580 [ 611.901540] ? __fget+0x340/0x540 [ 611.905028] ? __might_sleep+0x95/0x190 [ 611.909017] ? tty_vhangup+0x30/0x30 [ 611.912731] do_vfs_ioctl+0xd5f/0x1380 [ 611.916617] ? selinux_file_ioctl+0x46f/0x5e0 [ 611.921123] ? selinux_file_ioctl+0x125/0x5e0 [ 611.925650] ? ioctl_preallocate+0x210/0x210 [ 611.930071] ? selinux_file_mprotect+0x620/0x620 [ 611.934864] ? iterate_fd+0x360/0x360 [ 611.938664] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 611.944197] ? fput+0x128/0x1a0 [ 611.947512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 611.953051] ? security_file_ioctl+0x8d/0xc0 [ 611.957461] ksys_ioctl+0xab/0xd0 [ 611.960947] __x64_sys_ioctl+0x73/0xb0 [ 611.964875] do_syscall_64+0xfd/0x620 [ 611.968738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.974044] RIP: 0033:0x45a639 [ 611.977256] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:28:44 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x7, 0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0xdc}, 0x40) [ 611.996353] RSP: 002b:00007f38ad3b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 612.004086] RAX: ffffffffffffffda RBX: 00007f38ad3b6c90 RCX: 000000000045a639 [ 612.011354] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000006 [ 612.018637] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 612.026165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38ad3b76d4 [ 612.033468] R13: 00000000004c52d0 R14: 00000000004da3f0 R15: 0000000000000007 07:28:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000001540)=[{&(0x7f00000000c0)="60d3ae992d7841fcaf3b7ad696275c54b8d918224fcd6d77255742c9cc7516880137afbd15943f0ab58a7affa793a2b214afc55a49128ecdf620d216", 0x3c, 0x5}, {0x0, 0x100000000000000}, {&(0x7f0000000200), 0x0, 0xeb9}, {0x0, 0x0, 0x3ca}], 0x0, &(0x7f0000001600)={[], [{@dont_appraise='dont_appraise'}]}) 07:28:44 executing program 2 (fault-call:8 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_vif\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) 07:28:44 executing program 1: syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x7, 0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00', 0x0, 0xdc}, 0x40) 07:28:44 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101], [0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f3) rt_sigtimedwait(&(0x7f0000000040)={0x1bb7}, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x8) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000000)={0x1, {0x0, 0x7, 0xee1, 0x80000001, 0x7a8d}}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') lseek(r2, 0x203ffffd, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0x2a}, 0x9}, r3}}, 0x30) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:28:44 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) creat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/885], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000040)={r0, 0x0, 0xdc, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) [ 612.338731] input: syz1 as /devices/virtual/input/input291 [ 612.385242] ================================================================== [ 612.392958] BUG: KASAN: use-after-free in slip_open+0xe92/0x1175 [ 612.399145] Read of size 8 at addr ffff88809767ae48 by task syz-executor.2/2314 [ 612.406617] [ 612.408283] CPU: 0 PID: 2314 Comm: syz-executor.2 Not tainted 4.19.85-syzkaller #0 [ 612.416125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.425613] Call Trace: [ 612.428239] dump_stack+0x197/0x210 [ 612.431929] ? slip_open+0xe92/0x1175 [ 612.435768] print_address_description.cold+0x7c/0x20d [ 612.441082] ? slip_open+0xe92/0x1175 [ 612.444935] kasan_report.cold+0x8c/0x2ba [ 612.449126] __asan_report_load8_noabort+0x14/0x20 [ 612.454090] slip_open+0xe92/0x1175 [ 612.457744] ? sl_change_mtu+0x5c0/0x5c0 [ 612.461821] ? lock_downgrade+0x880/0x880 [ 612.466075] ? sl_change_mtu+0x5c0/0x5c0 [ 612.470147] tty_ldisc_open.isra.0+0x89/0xd0 [ 612.474823] tty_set_ldisc+0x2e3/0x690 [ 612.478723] tty_ioctl+0x65e/0x1510 [ 612.482369] ? tty_vhangup+0x30/0x30 [ 612.486085] ? mark_held_locks+0x100/0x100 [ 612.490327] ? perf_trace_lock_acquire+0x380/0x580 [ 612.495267] ? __fget+0x340/0x540 [ 612.498739] ? __might_sleep+0x95/0x190 [ 612.502717] ? tty_vhangup+0x30/0x30 [ 612.506439] do_vfs_ioctl+0xd5f/0x1380 [ 612.510325] ? selinux_file_ioctl+0x46f/0x5e0 [ 612.514827] ? selinux_file_ioctl+0x125/0x5e0 [ 612.519329] ? ioctl_preallocate+0x210/0x210 [ 612.523738] ? selinux_file_mprotect+0x620/0x620 [ 612.528503] ? iterate_fd+0x360/0x360 [ 612.532318] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 612.537875] ? fput+0x128/0x1a0 [ 612.541164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 612.546705] ? security_file_ioctl+0x8d/0xc0 [ 612.551307] ksys_ioctl+0xab/0xd0 [ 612.554783] __x64_sys_ioctl+0x73/0xb0 [ 612.558691] do_syscall_64+0xfd/0x620 [ 612.562512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.567727] RIP: 0033:0x45a639 [ 612.570919] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.589845] RSP: 002b:00007f38ad3b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 612.597581] RAX: ffffffffffffffda RBX: 00007f38ad3b6c90 RCX: 000000000045a639 [ 612.604877] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000006 [ 612.612156] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 612.619451] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38ad3b76d4 [ 612.626733] R13: 00000000004c52d0 R14: 00000000004da3f0 R15: 0000000000000007 [ 612.634032] [ 612.635658] Allocated by task 2167: [ 612.639290] save_stack+0x45/0xd0 [ 612.642752] kasan_kmalloc+0xce/0xf0 [ 612.646473] __kmalloc_node+0x51/0x80 [ 612.650286] kvmalloc_node+0x68/0x100 [ 612.654109] alloc_netdev_mqs+0x98/0xd40 [ 612.658189] slip_open+0x38e/0x1175 [ 612.661819] tty_ldisc_open.isra.0+0x89/0xd0 [ 612.666267] tty_set_ldisc+0x2e3/0x690 [ 612.670170] tty_ioctl+0x65e/0x1510 [ 612.673796] do_vfs_ioctl+0xd5f/0x1380 [ 612.677685] ksys_ioctl+0xab/0xd0 [ 612.681149] __x64_sys_ioctl+0x73/0xb0 [ 612.685037] do_syscall_64+0xfd/0x620 [ 612.688855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.694128] [ 612.695753] Freed by task 2167: [ 612.699033] save_stack+0x45/0xd0 [ 612.702496] __kasan_slab_free+0x102/0x150 [ 612.706730] kasan_slab_free+0xe/0x10 [ 612.710527] kfree+0xcf/0x220 [ 612.713627] kvfree+0x61/0x70 [ 612.716751] free_netdev+0x384/0x430 [ 612.720473] slip_open+0xd2a/0x1175 [ 612.724101] tty_ldisc_open.isra.0+0x89/0xd0 [ 612.728509] tty_set_ldisc+0x2e3/0x690 [ 612.732481] tty_ioctl+0x65e/0x1510 [ 612.736108] do_vfs_ioctl+0xd5f/0x1380 [ 612.739990] ksys_ioctl+0xab/0xd0 [ 612.743448] __x64_sys_ioctl+0x73/0xb0 [ 612.747349] do_syscall_64+0xfd/0x620 [ 612.751238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.756418] [ 612.758044] The buggy address belongs to the object at ffff88809767a380 [ 612.758044] which belongs to the cache kmalloc-4096 of size 4096 [ 612.771060] The buggy address is located 2760 bytes inside of [ 612.771060] 4096-byte region [ffff88809767a380, ffff88809767b380) [ 612.783117] The buggy address belongs to the page: [ 612.788045] page:ffffea00025d9e80 count:1 mapcount:0 mapping:ffff88812c3f0dc0 index:0x0 compound_mapcount: 0 [ 612.798201] flags: 0x1fffc0000008100(slab|head) [ 612.802873] raw: 01fffc0000008100 ffffea0002186308 ffffea000106f888 ffff88812c3f0dc0 [ 612.810790] raw: 0000000000000000 ffff88809767a380 0000000100000001 0000000000000000 [ 612.818850] page dumped because: kasan: bad access detected [ 612.824566] [ 612.826201] Memory state around the buggy address: [ 612.831126] ffff88809767ad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 612.838485] ffff88809767ad80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 612.845857] >ffff88809767ae00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 612.853213] ^ [ 612.858923] ffff88809767ae80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 612.866299] ffff88809767af00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 612.873678] ================================================================== [ 612.881044] Disabling lock debugging due to kernel taint [ 612.898715] Kernel panic - not syncing: panic_on_warn set ... [ 612.898715] [ 612.906184] CPU: 1 PID: 2314 Comm: syz-executor.2 Tainted: G B 4.19.85-syzkaller #0 [ 612.915275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.924630] Call Trace: [ 612.927239] dump_stack+0x197/0x210 [ 612.930859] ? slip_open+0xe92/0x1175 [ 612.934821] panic+0x26a/0x50e [ 612.938019] ? __warn_printk+0xf3/0xf3 [ 612.941934] ? slip_open+0xe92/0x1175 [ 612.945744] ? preempt_schedule+0x4b/0x60 [ 612.949906] ? ___preempt_schedule+0x16/0x18 [ 612.954349] ? trace_hardirqs_on+0x5e/0x220 [ 612.958686] ? slip_open+0xe92/0x1175 [ 612.962513] kasan_end_report+0x47/0x4f [ 612.966486] kasan_report.cold+0xa9/0x2ba [ 612.970628] __asan_report_load8_noabort+0x14/0x20 [ 612.975564] slip_open+0xe92/0x1175 [ 612.979185] ? sl_change_mtu+0x5c0/0x5c0 [ 612.983237] ? lock_downgrade+0x880/0x880 [ 612.987381] ? sl_change_mtu+0x5c0/0x5c0 [ 612.991437] tty_ldisc_open.isra.0+0x89/0xd0 [ 612.995926] tty_set_ldisc+0x2e3/0x690 [ 612.999855] tty_ioctl+0x65e/0x1510 [ 613.003486] ? tty_vhangup+0x30/0x30 [ 613.007195] ? mark_held_locks+0x100/0x100 [ 613.011446] ? perf_trace_lock_acquire+0x380/0x580 [ 613.016367] ? __fget+0x340/0x540 [ 613.019818] ? __might_sleep+0x95/0x190 [ 613.023783] ? tty_vhangup+0x30/0x30 [ 613.027488] do_vfs_ioctl+0xd5f/0x1380 [ 613.031366] ? selinux_file_ioctl+0x46f/0x5e0 [ 613.035867] ? selinux_file_ioctl+0x125/0x5e0 [ 613.040357] ? ioctl_preallocate+0x210/0x210 [ 613.044784] ? selinux_file_mprotect+0x620/0x620 [ 613.049586] ? iterate_fd+0x360/0x360 [ 613.053421] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 613.058992] ? fput+0x128/0x1a0 [ 613.062275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 613.067824] ? security_file_ioctl+0x8d/0xc0 [ 613.072226] ksys_ioctl+0xab/0xd0 [ 613.075674] __x64_sys_ioctl+0x73/0xb0 [ 613.079571] do_syscall_64+0xfd/0x620 [ 613.083368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.088545] RIP: 0033:0x45a639 [ 613.091732] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.111763] RSP: 002b:00007f38ad3b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 613.119480] RAX: ffffffffffffffda RBX: 00007f38ad3b6c90 RCX: 000000000045a639 [ 613.126740] RDX: 00000000200003c0 RSI: 0000000000005423 RDI: 0000000000000006 [ 613.134085] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 613.141341] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38ad3b76d4 [ 613.148861] R13: 00000000004c52d0 R14: 00000000004da3f0 R15: 0000000000000007 [ 613.157788] Kernel Offset: disabled [ 613.161480] Rebooting in 86400 seconds..