fc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:46 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:46 executing program 5: r0 = socket(0xa, 0x2, 0x0) recvfrom$inet6(r0, &(0x7f0000000140)=""/67, 0x43, 0x1, &(0x7f00000000c0)={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x1, 0x200, 0xffff, 0x9, 0x0}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={r1, 0x1, 0x80000000, 0xff, 0xc0000000000, 0xfffffffffffff475}, 0x14) setsockopt$inet6_opts(r0, 0x29, 0x4000000000037, &(0x7f0000000240)=@fragment, 0x8) ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x5) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000100)) 20:46:46 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x70) 20:46:46 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:46 executing program 5: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x200000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000080)='usernodevcgroupGPL-]\x89\x00', 0x16) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) r4 = memfd_create(&(0x7f0000000380)='#vmnet1nodevem1\x00', 0x0) write(r4, &(0x7f0000000040)="03", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r4, 0x0) ioctl$int_in(r3, 0x800000c0045002, &(0x7f00000000c0)) getpid() write$P9_RGETLOCK(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="2900000037010003000000000000000000000000000000cdb4a6068d96c3ffb4a78f97e07df714f7a8fe714a854162b09ebc520b11977dda19ca5dba378cdc88a84bd1af75b43506000000000000002b91a6df23eebcc9ed8399f68e1138"], 0x18) r5 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0xffffffffffff9bc7, 0x100, 0xe6}) dup2(r5, r2) io_setup(0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r5, 0x80045643, 0x3) [ 271.033222][T16472] input: syz1 as /devices/virtual/input/input26 20:46:46 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x200005a0) 20:46:46 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:46 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:46 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f40000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:46 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1, 0x4abe}, &(0x7f0000000140)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0fdfffef0f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:46 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:47 executing program 5: openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x200000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000080)='usernodevcgroupGPL-]\x89\x00', 0x16) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) r4 = memfd_create(&(0x7f0000000380)='#vmnet1nodevem1\x00', 0x0) write(r4, &(0x7f0000000040)="03", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r4, 0x0) ioctl$int_in(r3, 0x800000c0045002, &(0x7f00000000c0)) getpid() write$P9_RGETLOCK(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="2900000037010003000000000000000000000000000000cdb4a6068d96c3ffb4a78f97e07df714f7a8fe714a854162b09ebc520b11977dda19ca5dba378cdc88a84bd1af75b43506000000000000002b91a6df23eebcc9ed8399f68e1138"], 0x18) r5 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0xffffffffffff9bc7, 0x100, 0xe6}) dup2(r5, r2) io_setup(0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r5, 0x80045643, 0x3) 20:46:47 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) poll(&(0x7f0000000180)=[{r1, 0x10}], 0x1, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0xa0, 0x4, 0x9, "ee64c806d719edeee7e2580c05132112", "bfd92d52f869a32066d76166f09a71cb550c504a5e445a18a4126222b098124ac50cc0dd6bb54f2a76504cc09e03e1f88b6d73bd72de9cfeaf5290135b191bad3f31670dce216bc5d10ef3adf34c6c3a6f2fbd4b97ed3288234bdd4d4d5375f0c59daf0d4c4b7f147634ee96b963c2c400b879c812d1ece6335244db95c843e541035a9f2ea368da916b35"}, 0xa0, 0x2) 20:46:47 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 271.894046][T16641] input: syz1 as /devices/virtual/input/input30 20:46:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[], 0x0}, 0x20) 20:46:47 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) recvmmsg(r0, &(0x7f0000003800)=[{{&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/66, 0x42}, {&(0x7f0000000140)=""/194, 0xc2}, {&(0x7f0000000240)=""/132, 0x84}, {&(0x7f0000000300)}], 0x4, &(0x7f00000003c0)=""/133, 0x85}, 0x4}, {{&(0x7f0000000480)=@ipx, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000500)=""/34, 0x22}, {&(0x7f00000005c0)=""/77, 0x4d}, {&(0x7f0000000640)=""/169, 0xa9}, {&(0x7f0000000700)=""/203, 0xcb}, {&(0x7f0000000800)=""/229, 0xe5}, {&(0x7f0000000900)=""/189, 0xbd}, {&(0x7f0000000540)=""/1, 0x1}, {&(0x7f00000009c0)=""/247, 0xf7}], 0x8, &(0x7f0000000b40)=""/209, 0xd1}, 0xd55}, {{&(0x7f0000000c40)=@x25, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/239, 0xef}], 0x2, &(0x7f0000000e40)=""/31, 0x1f}, 0x10000}, {{&(0x7f0000000e80)=@un=@abs, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f00)=""/19, 0x13}, {&(0x7f0000000f40)=""/112, 0x70}, {&(0x7f0000000fc0)=""/25, 0x19}, {&(0x7f0000001000)=""/100, 0x64}], 0x4, &(0x7f00000010c0)=""/218, 0xda}, 0x800}, {{0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f00000011c0)=""/4096, 0x1000}], 0x1}, 0x2}, {{&(0x7f0000002200)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002280)=""/14, 0xe}, {&(0x7f00000022c0)=""/163, 0xa3}, {&(0x7f0000002380)=""/117, 0x75}], 0x3, &(0x7f0000002440)=""/4096, 0x1000}, 0x80000001}, {{&(0x7f0000003440)=@xdp, 0x80, &(0x7f0000003540)=[{&(0x7f00000034c0)=""/13, 0xd}, {&(0x7f0000003500)=""/6, 0x6}], 0x2, &(0x7f0000003580)=""/29, 0x1d}, 0x6}, {{&(0x7f00000035c0)=@caif, 0x80, &(0x7f0000003780)=[{&(0x7f0000003640)=""/110, 0x6e}, {&(0x7f00000036c0)=""/148, 0x94}], 0x2, &(0x7f00000037c0)=""/34, 0x22}, 0x3ff}], 0x8, 0x2063, 0x0) 20:46:47 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 272.219446][T16677] input: syz1 as /devices/virtual/input/input32 20:46:47 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:47 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 0: clock_gettime(0x7, &(0x7f0000000040)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a, 0xfffffffffffffe86, 0x4}, 0x20) r2 = dup3(r1, r1, 0x80000) write$FUSE_STATFS(r2, &(0x7f0000000080)={0x60, 0x0, 0x4, {{0x7, 0x8160, 0x7ff, 0x9, 0x10000, 0x101, 0x652, 0xfffffffffffffffd}}}, 0x60) 20:46:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:47 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 272.438892][T16701] input: syz1 as /devices/virtual/input/input34 20:46:47 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:47 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0600000000f00f000000ffdb4b360000000000003ba20000fc969292ccef370334da72223c3afa47746166a081db1ca6c38475866ebaf06a66a282e11a10b1b3fa40cc0ada659fe9bec50ca98a20fbb7c2c56f7026243e45adca64"], 0x0, 0x1a}, 0x20) 20:46:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x500, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000180)={0x0, [0x8001, 0x62c1, 0x4, 0x0, 0xa69d, 0x3, 0xffff, 0x0, 0x100, 0x8, 0x1, 0x7fff, 0x1, 0x1, 0x2, 0x0, 0x1000, 0x80000000, 0xf99a, 0x7, 0x0, 0x80, 0x10001, 0x9, 0x8de, 0x5, 0x80000000, 0x9, 0x8, 0x1, 0x2, 0x20, 0xd32, 0x7, 0x2, 0x6, 0x10000, 0x2000, 0xd4, 0x4, 0x1, 0x8, 0x6, 0x3, 0x5, 0xffffffff, 0x81, 0x6], 0x7}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x1a}, 0x20) 20:46:48 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f0000a1089e09812842e5c565ea0092dcbc00"], 0x0, 0x1a}, 0x20) 20:46:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(0x0, &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x1, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="85eb060025ab000000000001f2ffd7b478e770e40f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000180)) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000240)={0x7, 0x2, 0x2}) 20:46:48 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 272.994146][T16761] input: syz1 as /devices/virtual/input/input38 20:46:48 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:48 executing program 0: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x1ff, 0x0, 0xc6, 0x9, 0x8, 0x4c0}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0600832c00070000000120c2a57fbae08292f18ad503ff0f0000f00f00000020cebc007f5279412db22e58680d42666088c5268bb545eeb2b860214bdc2909d8b95e2a6bda1075aecc220133677aeda03a53e140ac2385d8546d50ba78846d06c4392db98ccd5b86e58c52c5c8c79935c6b5f5debc1dc28fb5794a2cce5de67aa0f76ffedbbb986b3a6c654b4a09fb0e37286807d2a11d59ed85912db8f8c345721ba63eea8a9dd90a31139d4afa854312205a9fe3b31ed482c3fa8c3f7ab66997dfe6e545ee96eed4b44746b97cd3640a50378f7e92adff8a3b69b92a"], 0x0, 0x1a}, 0x20) 20:46:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(0x0, &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:48 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:48 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f755ef45100000000cebc00"], 0x0, 0x1a}, 0x20) [ 273.335635][T16799] input: syz1 as /devices/virtual/input/input40 20:46:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:48 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(0x0, &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netlink(r1, 0x10e, 0x7, &(0x7f00000002c0), &(0x7f0000000300)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:48 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x202a41, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x9d, 0xad, &(0x7f00000000c0)="7753758f7e4303b3ad1c4b3329170872656957a286295e3d3c5b89a1b252eec552e8904d6ef0aa3a04e9159e5881c22ce5bc172092bd153c8b6c43124de86f2257f42e79049f70a92c572052a5392022a3f7705f87df6d454508947b768e4bff29b3292658808423e6ff92eb1dc70771fc52ecaf882f16c0e5c9e7f5966a5769f2b1d8b5c67da6f38c1e669256f69899e744474d8412f3963813eb3d3f", &(0x7f0000000180)=""/173, 0x4}, 0x28) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES32=r0], 0x0, 0x4}, 0x20) 20:46:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 273.601102][T16920] input: syz1 as /devices/virtual/input/input42 20:46:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10600, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000080)={0x34, 0x6, 0x0, {0x4, 0x6, 0xb, 0x0, '(trustedem1'}}, 0x34) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[], 0x0}, 0x20) 20:46:49 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:49 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:49 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) [ 273.874264][T17048] input: syz1 as /devices/virtual/input/input45 20:46:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x1a}, 0x20) 20:46:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:49 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000080)={0x1, 0x0, 'client1\x00', 0x1, "d157117dcaf8333a", "cd35ff7d30bc8c11217db4b49e01c7d394dfc92822d787a78741dfc9534796cb", 0x2, 0xffffffffffffffff}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x402100, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e22, 0xcb5, @mcast1}, {0xa, 0x4e21, 0x5, @remote, 0x66474dae}, 0x785a36d9, [0x8, 0x8001, 0x6, 0x5, 0x5, 0x7, 0x2, 0x5]}, 0x5c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:49 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 274.214808][T17111] input: syz1 as /devices/virtual/input/input48 20:46:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:49 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a, 0x178}, 0x20) 20:46:49 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:49 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000280)={0x4, 0x6, [0xfa, 0x3, 0x9, 0xffff, 0x7], 0x7fffffff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/raw6\x00') ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000080)=""/175) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb06000020000000000001f2ff0f0000f00f0044000053fba684eee81e04aa06754d704b5357f4358f002e7ab97e74a9c5281201c661e406d2d6ec69a9c70f233840106f22a6e7db37d9be21134ae328000000000000000000000000000000004207088b1dc0762f22e0115a93c06bd29ed88e3ae4822ad579e93b76aada400793814e07e9ad90195836b24fb2efe420d3b79382a0b2eaa4971739a7811a4892c991bf90a176c2f78fbc6332aa0d09a5024340804557eec7ffb25f5db2deefcb82f5675371ee73c92e99ea801543d2bb6773ab052b54f8cf9c674e5ea216e33702fe0ae8227e05742899b407684217286824ec732d20fc38c2710c1a27e4eb6860bee0801b00c0338808d3256a9eb75f3186681a4e9287fc2eccb65edae936bd05404e146474afe27fa3983df40a6899d6f5c56464c10695c19665c388997e4bef5d3e7833bdde79bcb3c9e45954e0f9998d10c6a2a510d36b046ee41ee63cb7679a6c4da8625b9a0179f28e248cf4a69e0bc75b6fe4005a9105fb5df45e8fde095a54e2e7b2d6b3f1dfdd399192b838676982157a3edbbba5ca7f308b8e5ec1e00da6233abe2540b042ffa7693d927bc7b2b8d2d8e878d8b29ec3ab75630d91b1082f572ee3bf05f880068857bb58115f9ed2fd4bda53af8b1de91d30d96926fb6726411758807feda962705b880d394c2045667cbd2eba983a9dd4707f4710367b4427c0f5194808d22b21b4493e91ad079eb158905991fac07b6cc9a7dec089f9a31c11613aba977813e637a4fad70a20aa4482ad559027051ed741cd61dab773eacfa25044ede504022d8e18d85239f79d1f7913dd5f37f95a3d2167158267dcaa7fca42a4d043335dcc9a9bab709c987500c3cd65bf1e113f97bac265ac292aa04fbce7876282a7de8e4e95a1465f735492b471bef65b14c5c25c93b19c0af9ef83a0a1c8e8b1c3e4b1ee4721c29d9368d50f305456ec9d5502bdf1c2ed146e85b56ba012ff101805bffc173baad0b9773cdb2cc9f22073af367eeac6c4"], 0x0, 0x1a}, 0x20) 20:46:49 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) [ 274.495094][T17213] input: syz1 as /devices/virtual/input/input50 20:46:50 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f95ac123c123f319bd070a18abe6b854bca059dceb51533bf47e1f25240957a038828f444bc02036e4dbfdeb83410a4b26fc8b1c6e203b90fcf00000000004306df03cad635002212a22fd4f7ac0734978a2abce58fb014e0d3dc7f532c739b6d0a20a00baebf5ce61218a1386a34a8f464615c3210342432f34cb3f71fb96ecf1e1176762f90837f804856759728254dee61b9776b3939c4546ff0f248c9329554b910981f8028df2b3b073b35365a253f4befc01351c2205d7cad3c1bb25c82555d4ff7be4b08cd159474fb66e2f7cadb72edf719e3624b") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:50 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:50 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0649000201f2fcf390b4cb8dabcab7349948e2bb16768971904d9c845d13b6053715f63fe544a76278f874525bcfe2488e2c095c333c30"], 0x0, 0x1a}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x3a, {{0x2, 0x4e21, @local}}}, 0x88) 20:46:50 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:50 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200100) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x7fff, 0x1ff}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0xfffffffffffff001}, &(0x7f0000000180)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[], 0x0, 0x0, 0xfffffffffffffe5d}, 0xfffffffffffffefd) 20:46:50 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x601, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0xe0, 0x0, 0x5, [{0x6, 0xffffffff, 0x8, 0x3700000000000000, 'cpuset/-'}, {0x5, 0x8001, 0x42, 0x1, 'eth1}procsystemem1loselinux\x1d&selfsecurityposix_acl_accesscgroupGPL'}, {0x5, 0x6, 0x14, 0x7ff, '\xbcbdevselfuserkeyring'}, {0x1, 0x5, 0x1, 0x1, '.'}]}, 0xe0) ioctl(r0, 0x6, &(0x7f0000000180)="02ae13ffffb93f00e7d61f") ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:50 executing program 2: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 20:46:50 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) 20:46:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb06000000000000000000ce3c0000000000000000000000007b60e8ddb2be39014b96b7b813e0f19454290331441b435c6657d9112b114e0cc60735164223645cd43f861f8119f8f3be3424cece5d4978c330f8bae875fa0953955a617b9938af63542e569001001bcf30ecfcc525ce3d0c24b5"], 0x0, 0x1a}, 0x20) r1 = gettid() r2 = getpgrp(r1) setpgid(r1, r2) 20:46:50 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 2: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 20:46:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x4e20}, 0x1c) listen(r1, 0x10001) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x14}) 20:46:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:51 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000080)={0x0}) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000000, 0x40000) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000140)=0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000180)={0x1, 'veth1_to_bridge\x00', 0x4}, 0x18) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000100)={r1, 0x80000, r3}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:51 executing program 2: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 20:46:51 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x129803) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06e30000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x8000}) 20:46:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:51 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SVE_SET_VL(0x32, 0x32394) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r1 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x0, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000280)={0x0, 0x2, 0x1, 0xfffffffffffffffe, '\x00', 0xfffffffffffffff8}) signalfd4(r0, &(0x7f0000000180)={0xffffffff7fffffff}, 0x8, 0x80000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0600010000000000000000000000005b63250eda9d0812fa7a75be9967dacf8afae1733165cead6ff13646"], 0x0, 0x1a}, 0x20) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) mkdirat$cgroup(r2, &(0x7f0000000200)='syz1\x00', 0x1ff) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x1ff, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x5, 0x8, 0x0, '[-system'}}, 0x29) 20:46:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") prctl$PR_SET_DUMPABLE(0x4, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a, 0x105}, 0x20) 20:46:51 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:52 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x101800, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x0, 0x4, 0x3}}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@window={0x3, 0x10001, 0x10000}, @sack_perm], 0x2) 20:46:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:52 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(0x0, &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000080)=0xffffffff) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="3d4e657bd3e0dea70a") getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb060000000000f0f4a30f89333d000000f00f"], 0x0, 0x1a}, 0x20) r2 = getpgid(0x0) fcntl$setown(r1, 0x8, r2) epoll_create1(0x80000) 20:46:52 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:52 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(0x0, &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x369a, 0x400002) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @empty}}, [0x6, 0x1, 0x81, 0x0, 0x20, 0x3, 0x2, 0x8, 0x6, 0x9, 0x800, 0x4, 0x3, 0xd5, 0xffffffffffffff66]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r1, 0xc9}, &(0x7f0000000240)=0x8) socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80002) ioctl$VIDIOC_ENUMAUDOUT(r2, 0xc0345642, &(0x7f0000000040)={0x8, "8bd8a40639feede6ffb03ca28d3e6a6fc5507ab918f722bfdd094db379d744a0", 0x1, 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9f63b9c8c601f2ff0f00"/26], 0x0, 0x1a}, 0x20) 20:46:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000280)={0xbe, 0x7d, 0x2, {{0x0, 0x9a, 0xfff, 0x2, {0x20}, 0x800000, 0x5, 0x4, 0x9, 0xf, '/dev/dlm_plock\x00', 0xf, '/dev/dlm_plock\x00', 0x3a, 'b+vboxnet1.eth0systemcpuseteth0\x9b!vboxnet0selfproc:vboxnet1', 0xf, '/dev/dlm_plock\x00'}, 0xf, '/dev/dlm_plock\x00', r2, r3, r4}}, 0xbe) 20:46:52 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(0x0, &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:52 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:53 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x200000) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000340)=0x5, 0x4) statx(r1, &(0x7f0000000380)='./file0\x00', 0x400, 0x209, &(0x7f00000003c0)) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r2, &(0x7f0000000180)="573ae0d17cc167850becb88f5ac2481fd461f11e105586e8508cd8e081dea6f3e811d336ea054da12408f1a2b5468807e2b5611b4716f6ba3c1df7012b180c5ad8f18e2b2a5afa79902d12792af042260ed5ec1e798a34ab6c4a56161eb980ebf0dee10f601d74ab6b6689ed462f1a6c8ff6762c3ffe4fd5c3b3c6cc92c54655ac80e6af", &(0x7f0000000240)=""/145}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[], 0x0}, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x588, 0x0, 0x0, 0x0, 0x138, 0x248, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x4b8, 0x5, &(0x7f0000000100), {[{{@ipv6={@remote, @mcast1, [0xff000000, 0xff, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xff000000, 0x991be0391447bc04], 'vlan0\x00', 'veth0_to_team\x00', {}, {0xff}, 0x0, 0xd6, 0x4, 0xc}, 0x0, 0x110, 0x138, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0xffff, 0x6, 0x1, [0x401, 0x8000, 0x40, 0x10001, 0xfffffffffffffe01, 0xfffffffffffffffa, 0x100000001, 0x100000000, 0xffffffffffffff7f, 0x1c, 0x0, 0x80000001, 0x10001, 0x1ff, 0x1, 0x4], 0x5}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ipv6={@mcast1, @loopback, [0x0, 0xffffff00, 0xff000000], [0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff], 'bridge_slave_0\x00', 'nlmon0\x00', {}, {0xff}, 0x29, 0x7, 0x0, 0x8}, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x10, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @port=0x4e24}}}, {{@ipv6={@ipv4={[], [], @broadcast}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xff000000, 0x0, 0xffffffff, 0xff000000], [0x0, 0xff000000, 0xffffffff, 0xffffff00], 'sit0\x00', 'ip6gre0\x00', {0xff}, {0xff}, 0x0, 0xffffffffffffffe0, 0x5, 0x40}, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x8, @ipv6=@local, @ipv6=@rand_addr="6535b18e3f601c7f600a68da6412528b", @gre_key=0x91, @icmp_id=0x67}}}, {{@ipv6={@remote, @mcast2, [0x0, 0xff, 0xffffffff, 0xffffffff], [0xff, 0x0, 0x0, 0xffffffff], 'vxcan1\x00', 'bcsf0\x00', {0xff}, {}, 0x5c, 0x4, 0x5, 0x3f}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x5, 0x7}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x3}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x15, @ipv4=@loopback, @ipv6=@dev={0xfe, 0x80, [], 0x1c}, @port=0x4e20, @port=0x4e22}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5e8) 20:46:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x900000890f, &(0x7f0000000100)="0adc1f123c123f319bd07bf7810b973654cb10798f4ba9a03298e169a844f439baea1ef8c4e57af1520378cdb9e8411afae71a66bc129d301451b93bda064f65c4ad290da526c178a38d720cc60115324bfdec0b7e6b711e169de03ba2c7eae4600d462256ee7a78c400eb5ee7877ad7b4b44d595a44561e5f2bbeaf034c735c8ecd7b3e436c88c96fa103079bcdbcccd593facf66cf1fdc692d2a7c4fda4ebc") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) sendto$llc(r1, &(0x7f0000000040)="965fe2973d8b6d3c854c7c59c67f47dd50252b7165c7ceaff869be82ef35b3df5152ee75b02443b42ad17c50118695f026a4c3eae68fa45b6520f161182f78199614b2460bc88c1bf6148882c2bbd3fd1d35a6d31158", 0x56, 0x10, &(0x7f00000000c0)={0x1a, 0x30f, 0x50d70ef3, 0x2, 0x6, 0x20, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000300)={r2, 0x5, &(0x7f0000000200)=[0x85a, 0xc6, 0x800, 0x4, 0x7], &(0x7f0000000240)=[0x7ff, 0x2, 0x80000001, 0xa831, 0xfffffffffffffff9, 0x3], 0x4, 0x8, 0xd6d, &(0x7f0000000280)=[0x2, 0x5, 0x20, 0x2, 0xfffffffffffff020, 0x646a, 0x7f, 0x177f], &(0x7f00000002c0)=[0x334, 0x6, 0x200, 0xffffffffffffffff, 0x6, 0x2]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:53 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x18}, 0x20) 20:46:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:53 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2002, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000100)={0x200, 0x6, 0x4, 0x80000000, {0x0, 0x2710}, {0x0, 0x1, 0x7, 0x7f, 0x401, 0x7, "0a1aaf9c"}, 0xea, 0x7, @fd, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80800, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000080)=0x4) 20:46:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:53 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4484c0, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], 0x6, 0x7f, &(0x7f0000000100)={0x80}, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 278.338357][T18114] input: syz1 as /devices/virtual/input/input63 20:46:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x80000) accept4$bt_l2cap(r1, 0x0, &(0x7f00000000c0), 0x80000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:54 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 278.690250][T18264] input: syz1 as /devices/virtual/input/input64 20:46:54 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:54 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYRESOCT=r0]], 0x0, 0x8}, 0x20) 20:46:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 278.937672][T18364] input: syz1 as /devices/virtual/input/input65 20:46:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$binfmt_aout(r0, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0xa99) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x282040, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f00000000c0)) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0040f00f00000000cebc08"], 0x0, 0x1a}, 0x20) clock_gettime(0x0, &(0x7f0000000080)) setsockopt$sock_timeval(r2, 0x1, 0x8000000000015, &(0x7f0000000100)={0x0, 0x2710}, 0x6cb22af62f14b4c9) 20:46:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:54 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r2 = request_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='*]-vmnet0keyring\x00', 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x101000, 0x100) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x6c, "383abb2fce689366033b3aa3517c0d6ecf48c401b4d3858c05798968e442ed521be480e351eb8d83494119840588bd298441881c6fb5ccb70379ee7be12b5571a6d8a9675f8f7daadb24995a7bc2e5902b922dcf5bed5799cbef158109f7431d8f25115e927615e72188764f"}, &(0x7f0000000380)=0x74) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000003c0)={r4, 0x7fff, 0x5, 0x800}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000c266869b7f5de44bb3ac2a929e4ac000000001f2"], 0x0, 0x1a, 0x0, 0xfffffffffffffffe}, 0x20) r5 = dup(r0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f0000000180)={0x5, @sdr={0x3231575b, 0x8}}) [ 279.255119][T18407] input: syz1 as /devices/virtual/input/input66 20:46:54 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:54 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10081, 0x0) setns(r1, 0x10000000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="010000000000000000000001f2ff0f0008000000000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:54 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f00000000c0)='net/snmp\x00'}, 0x30) r1 = fcntl$getown(r0, 0x9) r2 = getpgid(r1) syz_open_procfs(r2, &(0x7f0000000040)='net/snmp\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[], 0x0}, 0xfffffe61) [ 279.548581][T18514] input: syz1 as /devices/virtual/input/input67 20:46:55 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r1, @multicast2, @broadcast}, 0xc) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 279.824958][T18542] input: syz1 as /devices/virtual/input/input68 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x101100) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f00000000c0)) r2 = msgget(0x1, 0x200) msgsnd(r2, &(0x7f0000000040)={0x0, "d22f442a982da3b109bfaec0d8d1583f23d07c671a0eeac7adb46e72935c"}, 0x26, 0x800) 20:46:55 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:55 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000180)={0xff, @empty, 0x4e23, 0x0, 'wrr\x00', 0x28, 0x7, 0x4}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="060006000000000000000001f2ffdbb700f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 280.075756][T18662] input: syz1 as /devices/virtual/input/input69 20:46:55 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:55 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 280.220914][T18672] IPVS: set_ctl: invalid protocol: 255 0.0.0.0:20003 [ 280.290510][T18672] IPVS: set_ctl: invalid protocol: 255 0.0.0.0:20003 20:46:55 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 280.331392][T18767] input: syz1 as /devices/virtual/input/input70 20:46:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x90000, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000000c0)={r2}) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_int(r1, &(0x7f0000000140)=0x9c, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2bf0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000100)) r3 = dup(r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x300000c, 0x2012, r3, 0x0) 20:46:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:55 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r2 = getpid() fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x0, 0x3, 0x5, 0x100, r2}) 20:46:56 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 280.543354][T18877] input: syz1 as /devices/virtual/input/input71 20:46:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:56 executing program 0: inotify_init() r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) r1 = dup2(r0, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x800, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x485a, 0x408000) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f00000000c0)={'ip6_vti0\x00'}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000100)=ANY=[@ANYBLOB="eeeb06000000000300000001f2ff0f008de2fe7318e9c915fb4459c6a800f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:56 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[], 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(0x0, 0x4, 0x0) 20:46:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x1b, 0x8000a, 0x7fffffff) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e22, @broadcast}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e22, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x3, 0x9}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(0x0, 0x4, 0x0) 20:46:56 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 280.821106][T18935] input: syz1 as /devices/virtual/input/input72 20:46:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:56 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(0x0, 0x4, 0x0) 20:46:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008911, &(0x7f0000000000)="0adc1f16040000009bd070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0xa8, 0x0, &(0x7f0000000180)=[@reply_sg={0x40486312, {{0x3, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x38, 0x8, &(0x7f0000000080)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x3}, @fda={0x66646185, 0x9, 0x0, 0x2b}], &(0x7f00000000c0)=[0x78]}, 0x1}}, @reply={0x40406301, {0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000100), &(0x7f0000000140)=[0x20, 0x78]}}, @decrefs={0x40046307, 0x4}, @request_death={0x400c630e, 0x0, 0x2}], 0xaf, 0x0, &(0x7f0000000240)="ffabca65eb3c3de2f043b32a591cd81ed0a986acf623291140e967dda8b3bb7774ead50016e1ee8751aee72d025b07e4ccd866600da0036a753962578b6cc5ee32d0f87a63e3d73699c6f737098a68c6e7800cfc37a237f666adae120b6939163a804f0bd0e3634179ee4b0b1da6482ab252a504603babbfed32cf99a0faa64f126b1bf7adabd1a999faf6cd9365d3c716597f932e582bdb1cdda6f94c968b47379bca24063f4df3fe181f13b760f9"}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0600000000cebc00"], 0x0, 0x1a}, 0x20) socket$inet_udplite(0x2, 0x2, 0x88) 20:46:56 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000040)='net/tcp6\x00') 20:46:56 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 20:46:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 281.189648][T18972] input: syz1 as /devices/virtual/input/input73 20:46:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 20:46:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x80001) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000140)={r2, 0x1, 0x6, @dev={[], 0x1d}}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2954, 0x40) ioctl(r0, 0xfc4, &(0x7f0000000180)="0adc08123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb06fda300000000220001f2ff0f0000f00f00000000cebc0048292c2e784d3cec0c7b86029e448c1875baff4d17d252df675a010000c1c75c863d315c9dac01afc72c895a2a7f0ebbb20ae43560656224b797f787ebc770e9ec36a3d337140ec19408bc11a3fec265b8bac9295a6498784b28000000000000000000"], 0x0, 0x1a}, 0x20) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f00000002c0)=0x2) 20:46:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:56 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) 20:46:56 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 281.475517][T19095] input: syz1 as /devices/virtual/input/input74 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000000)="34c82d0758bf9b509b0000") socket$nl_crypto(0x10, 0x3, 0x15) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="040000001e00000000000001f202000000000000000000cebc00"], 0x0, 0x1a}, 0x20) r2 = dup3(r1, r0, 0x80000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000006d40)=0x1f, 0x4) 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYPTR], 0x0, 0x8}, 0x20) 20:46:57 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 281.823810][T19125] input: syz1 as /devices/virtual/input/input75 20:46:57 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20002, 0x0) recvmmsg(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000080)=@caif=@dgm, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/229, 0xe5}, {&(0x7f0000000200)=""/255, 0xff}, {&(0x7f0000000380)=""/198, 0xc6}, {&(0x7f0000000480)=""/197, 0xc5}], 0x4, &(0x7f00000005c0)=""/247, 0xf7}, 0x185e}, {{&(0x7f00000006c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/112, 0x70}, {&(0x7f00000007c0)=""/61, 0x3d}, {&(0x7f0000000800)=""/39, 0x27}], 0x3, &(0x7f0000000880)=""/95, 0x5f}, 0x1e}, {{&(0x7f0000000900)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000980)=""/245, 0xf5}, {&(0x7f0000000a80)=""/192, 0xc0}], 0x2, &(0x7f0000000b80)=""/25, 0x19}, 0x1f}], 0x3, 0x20, &(0x7f0000000c80)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000cc0)={@local, 0x18, r2}) fdatasync(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x24, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070a49227478802372fe6eac9e17e51416e62e4f0649fd9b89df21abd7c4c91d7cc5d02451b08e17cbe6a8d577a0e34b4bdf944") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 282.114406][T19152] input: syz1 as /devices/virtual/input/input76 20:46:57 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x800) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0xd, 0xc26c, {0x56, 0x2, 0x6500000, {0x68d6, 0xfffffffffffffd87}, {0x0, 0x80}, @cond=[{0x5d6, 0x96f, 0xcabd, 0x4, 0x6, 0x200}, {0xbf2, 0x5, 0x273, 0x7, 0x8, 0x283}]}, {0x57, 0x2, 0x1000, {0x1, 0x1c}, {0x401, 0x1}, @const={0x2, {0x4c470000000, 0x0, 0x101, 0x4}}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0600000000cebc0089b8f2e2cec4809743a7a30bd859c83d"], 0x0, 0x1a}, 0x20) 20:46:57 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0e000000000000000000f2ff0f0000f00f00"], 0x0, 0x1a}, 0x20) [ 282.352843][T19179] input: syz1 as /devices/virtual/input/input77 20:46:57 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:58 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 282.619940][T19205] input: syz1 as /devices/virtual/input/input78 20:46:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x400, 0x70bd2c, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000500300000000000000000000000000000000000028010000800200008002000080020000800200008002000003000000ff6b77d3232cdfcbb1138efd12b6ab4fbaacf032307d52ca6415a09ed053f8f3258fa80de3c943bf07a14bb1ec125faeaf1b0c9ed2170680f2e0fd7b779fd287629fea04865c6633a49cbdad1e95c3beb5fe4564c8575d9a8d0454cd57cc271c9b7f5a1b9a1c651e039b1dcf6a9b7113", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/48], @ANYBLOB="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"], 0x3b0) 20:46:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:58 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:58 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 282.911986][T19330] input: syz1 as /devices/virtual/input/input80 20:46:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f5afaba1fe67c02939a5406f40000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:58 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f6750"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:58 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:58 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x310, 0x70bd25, 0x25dfdbfc, {}, [""]}, 0x1c}}, 0x840) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 283.157028][T19451] input: syz1 as /devices/virtual/input/input81 20:46:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)='\x00'/11) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) ioctl(r1, 0x3, &(0x7f0000000200)="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") 20:46:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:58 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x10000) ioctl(r1, 0x1000008910, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:58 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:58 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 283.424206][T19477] input: syz1 as /devices/virtual/input/input82 [ 283.449517][T19480] FAULT_INJECTION: forcing a failure. [ 283.449517][T19480] name failslab, interval 1, probability 0, space 0, times 0 20:46:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 283.511642][T19480] CPU: 1 PID: 19480 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #88 [ 283.519653][T19480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.519660][T19480] Call Trace: [ 283.519682][T19480] dump_stack+0x172/0x1f0 [ 283.519703][T19480] should_fail.cold+0xa/0x15 [ 283.519723][T19480] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 283.547883][T19480] ? ___might_sleep+0x163/0x280 [ 283.552839][T19480] __should_failslab+0x121/0x190 [ 283.552857][T19480] should_failslab+0x9/0x14 [ 283.562297][T19480] kmem_cache_alloc+0x2b2/0x6f0 [ 283.567345][T19480] ? kasan_check_write+0x14/0x20 [ 283.572332][T19480] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 283.577990][T19480] getname_flags+0xd6/0x5b0 [ 283.582807][T19480] getname+0x1a/0x20 [ 283.586744][T19480] do_sys_open+0x2c9/0x5d0 [ 283.591278][T19480] ? filp_open+0x80/0x80 [ 283.595543][T19480] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 283.601023][T19480] ? do_syscall_64+0x26/0x610 [ 283.605718][T19480] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.611804][T19480] ? do_syscall_64+0x26/0x610 [ 283.616500][T19480] __x64_sys_open+0x7e/0xc0 [ 283.621024][T19480] do_syscall_64+0x103/0x610 [ 283.625638][T19480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.631542][T19480] RIP: 0033:0x412d41 [ 283.635457][T19480] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 20:46:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffffffffffe, &(0x7f00000000c0)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1000, 0x12280) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000040)=0x6, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x210002) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080)=0x4, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:46:59 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd060") r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000100)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[], 0x0, 0x0, 0xffffffffffffff2a, 0x1}, 0x20) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x20000400900, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000001c0)={0x1000, 0x40000bdb, &(0x7f0000000080)="3000612cabc2cb26cbf2cdef9bbcc3af6d16b5f60396fa425f839ac6e300db536671e493622271f4f0061d7071bd3c5fd6", &(0x7f0000000200)="63ea4b441def10ae088a9a7be43e6efd2a8c4abe492ea75ab4eac1a3bfc4c16ae7f842ecdb4f1b2e46f7203cad75aa5de38b78d0027d4f276e8344bab85f000eaa89374bd245cd6c64e6974e6658dded8b952187701aa5f22272699f77fbcb7171e148ad3333f16a5c031aba2465eb9cffdc1f8325a61dabc45a117c538ff227c01165cda3f5a2c71b15d58a61ad43ad277b37b1754ec54c709ac253de6b0088ff52dd0069f88bb47c98a39a83d04b93a3b52879c05be63f856e090fb68247d30c68c98c232570db00bc7c", 0x31, 0xcb}) 20:46:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0xf, &(0x7f0000000180)='/dev/sequencer\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r2, r1, 0x0, 0xf, &(0x7f0000000140)='/dev/sequencer\x00', r3}, 0x30) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000000c0)={0xc685, &(0x7f00000005c0)="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"}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") rt_sigsuspend(&(0x7f0000000040)={0x7}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00002000cebc00db7d0006e3735b2aa966dba130c1e430c928e1b5801c8c4cf589b084f804d790444b158dd0d1e00e6f7c8c12b370a89f80548d48880030442dabf3ac341795870a6b780b27017520ce752d09000000514eda4f26d25c00eacf911b64ce9df89e0f849e3c95fd1796f6b4fd03cb0f3d4ae4e0274340be92693b5d808bef323eb4a10d66a627f1015d3933333cdce360a8237c344a61dd4d038f20ce04f489dcd5325f011e05b2f376d6da13119436765cc6dddbdf7fa7ff5495e48e702a75486846f444f50a8e0eed"], 0x0, 0xffffffffffffffc9}, 0x20) 20:46:59 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 283.655075][T19480] RSP: 002b:00007f97b92857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 283.663504][T19480] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412d41 [ 283.671491][T19480] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f97b9285850 [ 283.679476][T19480] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 283.687558][T19480] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f97b92866d4 [ 283.695539][T19480] R13: 00000000004c7b08 R14: 00000000004ddb80 R15: 0000000000000004 20:46:59 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:46:59 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2a009000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x10, 0x70bd26, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) [ 283.919254][T19720] FAULT_INJECTION: forcing a failure. [ 283.919254][T19720] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 283.932582][T19720] CPU: 1 PID: 19720 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #88 [ 283.940651][T19720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.950808][T19720] Call Trace: [ 283.954259][T19720] dump_stack+0x172/0x1f0 [ 283.958925][T19720] should_fail.cold+0xa/0x15 [ 283.963583][T19720] ? fault_create_debugfs_attr+0x1e0/0x1e0 20:46:59 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 283.969435][T19720] ? __lock_acquire+0x548/0x3fb0 [ 283.974485][T19720] should_fail_alloc_page+0x50/0x60 [ 283.979788][T19720] __alloc_pages_nodemask+0x1a1/0x8d0 [ 283.985173][T19720] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 283.985188][T19720] ? find_held_lock+0x35/0x130 [ 283.985219][T19720] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 283.995687][T19720] cache_grow_begin+0x9c/0x860 [ 283.995705][T19720] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.995724][T19720] kmem_cache_alloc+0x62d/0x6f0 [ 284.017626][T19720] ? kasan_check_write+0x14/0x20 [ 284.022621][T19720] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 284.028200][T19720] getname_flags+0xd6/0x5b0 [ 284.032724][T19720] getname+0x1a/0x20 [ 284.037280][T19720] do_sys_open+0x2c9/0x5d0 [ 284.041929][T19720] ? filp_open+0x80/0x80 [ 284.046857][T19720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 284.052369][T19720] ? do_syscall_64+0x26/0x610 [ 284.057082][T19720] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.063156][T19720] ? do_syscall_64+0x26/0x610 [ 284.067834][T19720] __x64_sys_open+0x7e/0xc0 [ 284.072340][T19720] do_syscall_64+0x103/0x610 [ 284.076990][T19720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.082928][T19720] RIP: 0033:0x412d41 [ 284.086989][T19720] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 284.106599][T19720] RSP: 002b:00007f97b92857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 284.115000][T19720] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412d41 [ 284.123132][T19720] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f97b9285850 [ 284.131106][T19720] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 284.139174][T19720] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f97b92866d4 [ 284.147146][T19720] R13: 00000000004c7b08 R14: 00000000004ddb80 R15: 0000000000000004 [ 284.164269][T19716] input: syz1 as /devices/virtual/input/input83 20:46:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESHEX=r0]], 0x0, 0xfffffffffffffeb0, 0xfffffffffffffea5, 0xfffffffffffffffe}, 0xffffffffffffffc9) 20:46:59 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:46:59 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:46:59 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:46:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 284.302381][T19836] FAULT_INJECTION: forcing a failure. [ 284.302381][T19836] name failslab, interval 1, probability 0, space 0, times 0 [ 284.366226][T19836] CPU: 0 PID: 19836 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #88 [ 284.374351][T19836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.384502][T19836] Call Trace: [ 284.387816][T19836] dump_stack+0x172/0x1f0 [ 284.392174][T19836] should_fail.cold+0xa/0x15 [ 284.396784][T19836] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 284.402610][T19836] ? ___might_sleep+0x163/0x280 [ 284.407479][T19836] __should_failslab+0x121/0x190 [ 284.412433][T19836] should_failslab+0x9/0x14 [ 284.417036][T19836] kmem_cache_alloc+0x2b2/0x6f0 [ 284.421899][T19836] ? __save_stack_trace+0x99/0x100 [ 284.427050][T19836] __alloc_file+0x27/0x300 [ 284.431491][T19836] alloc_empty_file+0x72/0x170 [ 284.436265][T19836] path_openat+0xef/0x46e0 [ 284.440692][T19836] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 284.446513][T19836] ? kasan_slab_alloc+0xf/0x20 [ 284.451284][T19836] ? kmem_cache_alloc+0x11a/0x6f0 [ 284.451299][T19836] ? getname_flags+0xd6/0x5b0 [ 284.451312][T19836] ? getname+0x1a/0x20 [ 284.451332][T19836] ? do_sys_open+0x2c9/0x5d0 [ 284.465074][T19836] ? __x64_sys_open+0x7e/0xc0 [ 284.465091][T19836] ? do_syscall_64+0x103/0x610 [ 284.465107][T19836] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.465134][T19836] ? __lock_acquire+0x548/0x3fb0 [ 284.490258][T19836] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 284.495649][T19836] ? __alloc_fd+0x44d/0x560 [ 284.500179][T19836] do_filp_open+0x1a1/0x280 [ 284.504697][T19836] ? may_open_dev+0x100/0x100 [ 284.509389][T19836] ? lock_downgrade+0x880/0x880 20:46:59 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 284.514253][T19836] ? kasan_check_read+0x11/0x20 [ 284.519117][T19836] ? do_raw_spin_unlock+0x57/0x270 [ 284.524357][T19836] ? _raw_spin_unlock+0x2d/0x50 [ 284.529217][T19836] ? __alloc_fd+0x44d/0x560 [ 284.533923][T19836] do_sys_open+0x3fe/0x5d0 [ 284.538360][T19836] ? filp_open+0x80/0x80 [ 284.542618][T19836] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 284.548094][T19836] ? do_syscall_64+0x26/0x610 [ 284.552956][T19836] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.559125][T19836] ? do_syscall_64+0x26/0x610 [ 284.563834][T19836] __x64_sys_open+0x7e/0xc0 [ 284.568530][T19836] do_syscall_64+0x103/0x610 [ 284.573152][T19836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.579053][T19836] RIP: 0033:0x412d41 [ 284.582957][T19836] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 284.602564][T19836] RSP: 002b:00007f97b92857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 284.610995][T19836] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412d41 [ 284.618978][T19836] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f97b9285850 [ 284.624241][T19953] 9pnet_virtio: no channels available for device 127.0.0.1 [ 284.626955][T19836] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 284.626964][T19836] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f97b92866d4 20:47:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="89e6f2119feb06000000000000000001f2ff0f0000f00f00d45c00cebc00f17b4349a0b2e73a64fc3cc50000"], 0x0, 0x1a}, 0x20) 20:47:00 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 284.626972][T19836] R13: 00000000004c7b08 R14: 00000000004ddb80 R15: 0000000000000004 [ 284.705646][T19999] input: syz1 as /devices/virtual/input/input84 20:47:00 executing program 5 (fault-call:2 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:47:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:00 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:00 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socketpair(0x2, 0x803, 0x3ff, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f0000000300)="511ecf8024159ce7b1be13d005078c0871c17fe5b4f5e7aeb6d25dd8ade514da114b004e150762201fa2e23f6ab168b728f6ff47d0ba33726a9d0c756635416b1dd00c62fce31515221f6c46f09609ed5c2f7c37097b10ab24e2b66778d177e3d58f8ad33b7cf56f44d9f2ed95b62cebde1d13b99f", 0x75}, {&(0x7f0000000380)="517e2f139c49f2f5c01b0613ffa08d12f1d8f4ceaeb8807d9af6abfd311c787e559db82337555db11cc65b3b3f123efc2d253c8b3acd604d45e98a8425d8dfe466a5cb71a168c7ebcafb6feb7ec830dd3061046caa9f49eca08669536b1a2baf6fb8c6157a86fa8593d98053eaefc4490b8c25884e795afb9c4307419eec9be5aa4c69518c612ffb147fed192f658683fa14a889e0bc389ddfa601175b6e0223bb6b9b612d23d3b6ef54a2f39e7cc97349", 0xb1}], 0x3}, 0x20048800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x1a}, 0x20) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x1, 0x402) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000280)={r3, 0x6}) 20:47:00 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf98002000020000000000000000"], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 284.955674][T20072] 9pnet_virtio: no channels available for device 127.0.0.1 20:47:00 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:00 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYRESOCT=r0], 0x0, 0x17}, 0xffffffffffffffd3) [ 285.100239][T20175] FAULT_INJECTION: forcing a failure. [ 285.100239][T20175] name failslab, interval 1, probability 0, space 0, times 0 20:47:00 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 285.174934][T20175] CPU: 1 PID: 20175 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #88 [ 285.183046][T20175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.193124][T20175] Call Trace: [ 285.196430][T20175] dump_stack+0x172/0x1f0 [ 285.200781][T20175] should_fail.cold+0xa/0x15 [ 285.205393][T20175] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 285.211234][T20175] ? ___might_sleep+0x163/0x280 [ 285.216114][T20175] __should_failslab+0x121/0x190 [ 285.221066][T20175] should_failslab+0x9/0x14 [ 285.225588][T20175] kmem_cache_alloc+0x2b2/0x6f0 [ 285.230429][T20175] ? rcu_read_lock_sched_held+0x110/0x130 [ 285.230443][T20175] ? kmem_cache_alloc+0x32e/0x6f0 [ 285.230464][T20175] security_file_alloc+0x39/0x170 [ 285.230479][T20175] __alloc_file+0xac/0x300 [ 285.230498][T20175] alloc_empty_file+0x72/0x170 [ 285.246767][T20175] path_openat+0xef/0x46e0 [ 285.246785][T20175] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 285.246796][T20175] ? kasan_slab_alloc+0xf/0x20 [ 285.246815][T20175] ? kmem_cache_alloc+0x11a/0x6f0 [ 285.256054][T20175] ? getname_flags+0xd6/0x5b0 [ 285.256065][T20175] ? getname+0x1a/0x20 [ 285.256084][T20175] ? do_sys_open+0x2c9/0x5d0 [ 285.256096][T20175] ? __x64_sys_open+0x7e/0xc0 [ 285.256116][T20175] ? do_syscall_64+0x103/0x610 [ 285.289958][T20175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.289983][T20175] ? __lock_acquire+0x548/0x3fb0 [ 285.289998][T20175] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 285.290020][T20175] ? __alloc_fd+0x44d/0x560 [ 285.320383][T20175] do_filp_open+0x1a1/0x280 [ 285.324898][T20175] ? may_open_dev+0x100/0x100 [ 285.329625][T20175] ? lock_downgrade+0x880/0x880 [ 285.334606][T20175] ? kasan_check_read+0x11/0x20 [ 285.339678][T20175] ? do_raw_spin_unlock+0x57/0x270 [ 285.345056][T20175] ? _raw_spin_unlock+0x2d/0x50 [ 285.349925][T20175] ? __alloc_fd+0x44d/0x560 [ 285.354446][T20175] do_sys_open+0x3fe/0x5d0 [ 285.358868][T20175] ? filp_open+0x80/0x80 [ 285.363120][T20175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 285.368580][T20175] ? do_syscall_64+0x26/0x610 [ 285.373270][T20175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.379352][T20175] ? do_syscall_64+0x26/0x610 [ 285.384050][T20175] __x64_sys_open+0x7e/0xc0 [ 285.388577][T20175] do_syscall_64+0x103/0x610 [ 285.393177][T20175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.399085][T20175] RIP: 0033:0x412d41 [ 285.403079][T20175] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 20:47:00 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 285.422887][T20175] RSP: 002b:00007f97b92437a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 285.431386][T20175] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412d41 [ 285.431393][T20175] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f97b9243850 [ 285.431400][T20175] RBP: 000000000073c040 R08: 000000000000000f R09: 0000000000000000 [ 285.431407][T20175] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f97b92446d4 [ 285.431414][T20175] R13: 00000000004c7b08 R14: 00000000004ddb80 R15: 0000000000000004 [ 285.494919][T20301] 9pnet_virtio: no channels available for device 127.0.0.1 20:47:01 executing program 5 (fault-call:2 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:47:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', 0x0}) recvfrom$packet(r1, &(0x7f00000005c0)=""/4096, 0x1000, 0x12001, &(0x7f00000000c0)={0x11, 0x7, r2, 0x1, 0x5, 0x6, @dev={[], 0x22}}, 0x14) 20:47:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:01 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r0, 0x8001, &(0x7f0000000040)="d87ab209453f48615abd0856bd258f1f18a992de36270533176f46714157d6f241a2c79e0e0d2352ebc2c1387bdc7ee2d94291efa825c3a18045b1cacefd47846182d80d5c63ecc8ed9db3b03a187df6e234fb9579da8f05f2c89936446ed83e949fe9f2bd561cd14546ee985593356ec351e9f2c07bb680817409d6891c7cfa2ec092e440420291df1e8527393b99cf3032d5b28cc9209dd8a08fe775692c0eb0466f67fda1e400fafadabd9f68d793f12ddc81539917452a6badce70ab5678cdbaec1aa6ce7562d008") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fsetxattr(r1, &(0x7f0000000140)=@random={'user.', 'cgroupprocvmnet0posix_acl_access\x00'}, &(0x7f0000000180)='cpuset\x7f/\x00', 0x9, 0x3) r2 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000240)=@req3={0xfffffffffffffffb, 0x401, 0x4, 0x4, 0x0, 0xe0a, 0xd1}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 285.838965][T20426] FAULT_INJECTION: forcing a failure. [ 285.838965][T20426] name failslab, interval 1, probability 0, space 0, times 0 [ 285.899617][T20426] CPU: 0 PID: 20426 Comm: syz-executor.5 Not tainted 5.1.0-rc6+ #88 [ 285.907635][T20426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.917874][T20426] Call Trace: [ 285.921192][T20426] dump_stack+0x172/0x1f0 [ 285.925543][T20426] should_fail.cold+0xa/0x15 [ 285.930153][T20426] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 285.935984][T20426] ? ___might_sleep+0x163/0x280 [ 285.940858][T20426] __should_failslab+0x121/0x190 [ 285.945821][T20426] should_failslab+0x9/0x14 [ 285.950348][T20426] kmem_cache_alloc_trace+0x2d1/0x760 [ 285.955743][T20426] __request_module+0x324/0xb7b [ 285.960699][T20426] ? kobj_lookup+0x252/0x460 [ 285.965390][T20426] ? base_probe+0x31/0x70 [ 285.970098][T20426] ? free_modprobe_argv+0xa0/0xa0 [ 285.977089][T20426] ? tomoyo_check_open_permission+0x19e/0x3f0 [ 285.983353][T20426] ? lock_downgrade+0x880/0x880 [ 285.988655][T20426] ? mutex_trylock+0x1e0/0x1e0 [ 285.993431][T20426] ? kasan_check_write+0x14/0x20 20:47:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6"]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 20:47:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000200)="0adc1f123c123f319bd070ba2b2e90b6351a1a8a584695a0ebd832719314c9cf6d4a400340a6d56a1fcd7dbc3900e064b9b0de8b76256bff3c39b40a97fb73c954a0d594b97e8166d85fdcd1e0c96ce44a39b0d7a9f35fe4abb9d0381fa2a0f094bff7e880f55296febfca629ae5ec429900000033516abfff01ae7724b78574c35e30d7022cbfe3fe968ed397ce64f76bc545b11bacc6a6a26e22041d40d14b50d897fc0d08dcc5f2e2a5fa687676158d3bf35e5bcbb288e313e11be14d1509682be59e420aa7fcc7ad42b775d2fd172341216322c9d1422775d801c1dc65cdeffc417e0ac2a5a057e0954637612419106b68f3ac89aeb605198098d358b454cd747751beafcedeacf8c1804cc8b75a87a4c8249568") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 285.998467][T20426] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 286.004222][T20426] base_probe+0x31/0x70 [ 286.008394][T20426] kobj_lookup+0x265/0x460 [ 286.012829][T20426] ? exact_match+0x20/0x20 [ 286.017349][T20426] chrdev_open+0x31a/0x6b0 [ 286.021784][T20426] ? cdev_put.part.0+0x50/0x50 [ 286.021805][T20426] ? security_file_open+0x8d/0x300 [ 286.021824][T20426] do_dentry_open+0x4e2/0x1250 [ 286.031858][T20426] ? kasan_check_read+0x11/0x20 [ 286.041543][T20426] ? cdev_put.part.0+0x50/0x50 [ 286.041563][T20426] ? chown_common+0x5c0/0x5c0 [ 286.051071][T20426] ? inode_permission+0xb4/0x570 [ 286.051093][T20426] vfs_open+0xa0/0xd0 [ 286.051107][T20426] path_openat+0x10e9/0x46e0 [ 286.051128][T20426] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 286.060225][T20426] ? kasan_slab_alloc+0xf/0x20 [ 286.060242][T20426] ? kmem_cache_alloc+0x11a/0x6f0 [ 286.060253][T20426] ? getname_flags+0xd6/0x5b0 [ 286.060268][T20426] ? getname+0x1a/0x20 [ 286.071002][T20426] ? do_sys_open+0x2c9/0x5d0 [ 286.071027][T20426] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 286.071050][T20426] ? __alloc_fd+0x44d/0x560 [ 286.071066][T20426] do_filp_open+0x1a1/0x280 [ 286.071082][T20426] ? may_open_dev+0x100/0x100 [ 286.071105][T20426] ? kasan_check_read+0x11/0x20 [ 286.071125][T20426] ? do_raw_spin_unlock+0x57/0x270 [ 286.085629][T20426] ? _raw_spin_unlock+0x2d/0x50 [ 286.085645][T20426] ? __alloc_fd+0x44d/0x560 [ 286.085671][T20426] do_sys_open+0x3fe/0x5d0 [ 286.085688][T20426] ? filp_open+0x80/0x80 [ 286.085706][T20426] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 286.085719][T20426] ? do_syscall_64+0x26/0x610 [ 286.085741][T20426] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.113403][T20426] ? do_syscall_64+0x26/0x610 [ 286.113426][T20426] __x64_sys_open+0x7e/0xc0 [ 286.113445][T20426] do_syscall_64+0x103/0x610 [ 286.125589][T20438] input: syz1 as /devices/virtual/input/input88 [ 286.128220][T20426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.128232][T20426] RIP: 0033:0x412d41 [ 286.128246][T20426] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 286.128253][T20426] RSP: 002b:00007f97b92857a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 286.128266][T20426] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412d41 [ 286.128273][T20426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f97b9285850 [ 286.128280][T20426] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 286.128288][T20426] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f97b92866d4 20:47:01 executing program 5 (fault-call:2 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:47:01 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/51], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x3) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{}, {}, {}, {}]}) [ 286.128296][T20426] R13: 00000000004c7b08 R14: 00000000004ddb80 R15: 0000000000000004 20:47:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:01 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x80, 0x305c00) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x480007, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000100)={@local, @multicast1}, &(0x7f0000000140)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f00"], 0x0, 0x1a}, 0x20) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x7, 0x8}) 20:47:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:47:01 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:01 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 286.586482][T20578] input: syz1 as /devices/virtual/input/input89 20:47:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xedc, 0x10c00) openat(r1, &(0x7f0000000080)='./file0\x00', 0x200, 0xc) 20:47:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/#ev/input/event#\x00', 0x4, 0x0) [ 286.704668][T20588] 9pnet_virtio: no channels available for device 127.0.0.1 20:47:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:02 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 286.799816][T20681] input: syz1 as /devices/virtual/input/input90 20:47:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/%ev/input/event#\x00', 0x4, 0x0) 20:47:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000100)=0x2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000040)={0x7f, 0x3c00000, "d6d030f44249cd60aa649204d0576a1d12bf624647cbae62", {0x2, 0x9}, 0x167}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc39c84ab365c7436300") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x0) connect$ax25(r1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:02 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) [ 287.045631][T20722] input: syz1 as /devices/virtual/input/input91 [ 287.062813][T20715] 9pnet_virtio: no channels available for device 127.0.0.1 bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/*ev/input/event#\x00', 0x4, 0x0) 20:47:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:02 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:02 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/+ev/input/event#\x00', 0x4, 0x0) 20:47:02 executing program 0: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4028c0, 0x140) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0], 0x0, 0x3}, 0x20) 20:47:02 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) [ 287.335406][T20847] 9pnet_virtio: no channels available for device 127.0.0.1 [ 287.366431][T20850] input: syz1 as /devices/virtual/input/input92 20:47:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/-ev/input/event#\x00', 0x4, 0x0) 20:47:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$addseals(r0, 0x409, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:03 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/.ev/input/event#\x00', 0x4, 0x0) 20:47:03 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) 20:47:03 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$uinput_user_dev(r0, &(0x7f00000005c0)={'syz1\x00', {0x4, 0x7ff, 0x51a3, 0x9}, 0x25, [0x8, 0x6, 0x1, 0x6, 0x8, 0x3, 0x101, 0x401, 0x6, 0x8, 0x3f5, 0x0, 0x2, 0xbc, 0x2, 0x5, 0x5, 0xfff, 0x6, 0x3, 0x1, 0xb89a, 0xaa, 0x400, 0x8, 0xded, 0xffffffffffffffff, 0x6, 0x4, 0xffff, 0x466a, 0x1, 0x1, 0xff, 0xfffffffeffffffff, 0x9, 0x4, 0x4, 0x6, 0x5, 0x7fffffff, 0x0, 0x7, 0x1, 0x7, 0xc160, 0x1000, 0x3ff, 0x80000001, 0x6, 0x3, 0x3090, 0x20, 0x7, 0xf4, 0x1, 0x101, 0x24, 0xfffffffffffffffc, 0x7f, 0x5, 0x10000, 0x1, 0x24ca84b4], [0x100000000, 0x7fffffff, 0x3, 0x8, 0xffff, 0x10000, 0x108, 0x100, 0x10001, 0x1a2a, 0x1ff, 0x10001, 0x100000001, 0x200, 0x6, 0x3, 0x59, 0x800, 0x1194c2c9, 0x9, 0x20, 0xff, 0x0, 0x20, 0x5, 0x0, 0x3, 0x7, 0x6, 0x4, 0xd1a, 0x6, 0xfffffffffffffffd, 0xb0a, 0x9, 0x0, 0x9, 0x61, 0x0, 0x1f, 0x2, 0x100000001, 0x0, 0x6, 0x9, 0x4d, 0x3654, 0x6, 0xc55, 0x8, 0x8, 0x0, 0x2, 0x0, 0x80000001, 0x7, 0x1, 0x3ff, 0xfac9, 0x645, 0x9, 0x845d, 0x9, 0x2b9f], [0xffffffff, 0x2, 0x9, 0x101, 0x100000001, 0x80, 0x1, 0x7, 0x0, 0x1, 0x100000001, 0xddbf, 0x4, 0x81, 0x401, 0xffffffff, 0x7, 0x5, 0x100000000, 0x0, 0x80000000, 0x1, 0x7, 0x8a6, 0x3, 0x2, 0xffff, 0x8, 0x6, 0xb02, 0xffff, 0x3, 0x6b40, 0x1, 0x81, 0x20, 0x6, 0x9, 0x800, 0x2, 0x7f, 0x6, 0x3, 0xffffffff, 0x2, 0x9, 0x79e, 0x7, 0x24, 0x10000, 0x4, 0x7, 0x1ff, 0x20, 0x4, 0xae, 0x7fff, 0x7fff, 0x7, 0x5, 0x0, 0x3, 0x8, 0x9], [0x3, 0x6, 0xe420, 0x6200, 0x1, 0x230, 0x0, 0x0, 0x7fffffff, 0x200000000, 0x768c, 0x6, 0x4, 0x8, 0x3, 0x0, 0x8, 0x3ff0000000000000, 0x5, 0xc5, 0x8, 0x8000000000000000, 0x7f, 0x4, 0x8, 0xffffffff, 0x1000, 0x4ec, 0x0, 0x1ff8000000, 0x9, 0x3, 0x3, 0x800, 0x1ff, 0x1, 0x71d, 0x2, 0x8a26, 0x3, 0x10001, 0x6, 0x92d9, 0x0, 0x0, 0x9, 0x1, 0x8, 0x4, 0x1, 0x7, 0x3f, 0x3f, 0x7, 0x4, 0x3a0b, 0xffff, 0x100000000, 0x9, 0xe6ab, 0x8, 0x1, 0x8, 0x8]}, 0x45c) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) [ 287.616338][T20870] 9pnet_virtio: no channels available for device 127.0.0.1 [ 287.698204][T20881] input: syz1 as /devices/virtual/input/input93 20:47:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x4100) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x7, @pix={0x3ff, 0x8, 0x32314142, 0x0, 0x8, 0x200, 0xe, 0x0, 0x1, 0x6, 0x2, 0x6}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='//ev/input/event#\x00', 0x4, 0x0) 20:47:03 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 287.826249][T20896] 9pnet_virtio: no channels available for device 127.0.0.1 20:47:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 20:47:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/0ev/input/event#\x00', 0x4, 0x0) 20:47:03 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r4, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000040)=""/125) 20:47:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c1225709bd070af91c63296d2141713d37fa5cbccb52e38a1a43585ac3a5a80c319c88296668c319ab7c89372488d107dbe7dd6fa22e3941bcdaa542d7fedbc2097ab5b6cb2f5a12de357fa6651ee8e7f") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB, @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 288.016115][T21010] input: syz1 as /devices/virtual/input/input94 20:47:03 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/Xev/input/event#\x00', 0x4, 0x0) 20:47:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008913, &(0x7f0000000100)="0adc1f123c123f319bd070e451ce4337fb54f995bb852478de000000000000001396b7c57d99b0f6c872e6d9bcce8df72a84960a7b60b8d76413f891eff668be333b7aa0947ba3f94e8179674ca6f0f7c72aaef46be652e9fb3f1035af6474f862266935a603dd3562cb86bf66b7b53a7b40fd7adf732463b750caafc318d36fb519446af16959a63209233880ebdc28d2385beb2cf620f34a5bab492fb4ea1e7ef0d8d24bc405885d0676039473041b2520480eb069de31bd97d1972dd1bb592ca02b79ddc0d1aec5feb3799c829fea2fe9ec8682f71a47e88600"/228) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0600000008000000000000000f0000f00f0000310a8072f7b8a6f0fbe3ffcebc00"], 0x0, 0x174}, 0x20) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x80100) fcntl$setpipe(r0, 0x407, 0xfff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x20a000, 0x0) 20:47:03 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 288.189019][T21027] 9pnet_virtio: no channels available for device 127.0.0.1 20:47:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 20:47:03 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/cev/input/event#\x00', 0x4, 0x0) [ 288.331643][T21091] input: syz1 as /devices/virtual/input/input95 20:47:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3ff, 0xd0a08) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000080)=0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:03 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 20:47:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/iev/input/event#\x00', 0x4, 0x0) 20:47:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x1a}, 0x20) 20:47:04 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x0, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 288.615689][T21203] input: syz1 as /devices/virtual/input/input96 20:47:04 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/lev/input/event#\x00', 0x4, 0x0) 20:47:04 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06000000000000000001f2ff0f0000f00f00000000cebc00"], 0x0, 0x1a}, 0x20) 20:47:04 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x0, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/oev/input/event#\x00', 0x4, 0x0) 20:47:04 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 289.048900][T21308] input: syz1 as /devices/virtual/input/input97 20:47:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/pev/input/event#\x00', 0x4, 0x0) 20:47:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb06150b00000000000001f2ff0f0000f00f2800000000cebc"], 0x0, 0x1a}, 0x20) 20:47:04 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x0, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:04 executing program 2 (fault-call:6 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:04 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/sev/input/event#\x00', 0x4, 0x0) [ 289.324636][T21331] input: syz1 as /devices/virtual/input/input98 [ 289.368503][T21331] FAULT_INJECTION: forcing a failure. [ 289.368503][T21331] name failslab, interval 1, probability 0, space 0, times 0 [ 289.446375][T21331] CPU: 1 PID: 21331 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 289.454402][T21331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.454408][T21331] Call Trace: [ 289.454434][T21331] dump_stack+0x172/0x1f0 [ 289.454455][T21331] should_fail.cold+0xa/0x15 [ 289.477510][T21331] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 289.483340][T21331] ? ___might_sleep+0x163/0x280 [ 289.483362][T21331] __should_failslab+0x121/0x190 [ 289.483378][T21331] should_failslab+0x9/0x14 [ 289.483398][T21331] __kmalloc_track_caller+0x2d8/0x740 [ 289.503388][T21331] ? pointer+0xa30/0xa30 [ 289.507650][T21331] ? __lock_acquire+0x548/0x3fb0 [ 289.512703][T21331] ? kasprintf+0xbb/0xf0 [ 289.516963][T21331] kvasprintf+0xc8/0x170 [ 289.521220][T21331] ? bust_spinlocks+0xe0/0xe0 [ 289.525916][T21331] ? debug_check_no_obj_freed+0x200/0x464 [ 289.531638][T21331] kasprintf+0xbb/0xf0 [ 289.535721][T21331] ? kvasprintf_const+0x190/0x190 [ 289.540759][T21331] ? input_default_getkeycode+0x520/0x520 [ 289.546473][T21331] input_devnode+0x4c/0x90 [ 289.550888][T21331] device_get_devnode+0x175/0x2e0 [ 289.555914][T21331] ? refcount_sub_and_test_checked+0x154/0x200 [ 289.562073][T21331] devtmpfs_delete_node+0xaa/0x1a0 [ 289.567183][T21331] ? devtmpfs_create_node+0x250/0x250 [ 289.572553][T21331] ? __device_link_free_srcu+0x120/0x120 [ 289.578171][T21331] ? refcount_dec_and_test_checked+0x1b/0x20 [ 289.584140][T21331] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 289.590364][T21331] ? kobject_put+0x84/0xe0 [ 289.594765][T21331] ? __device_link_free_srcu+0x120/0x120 [ 289.600466][T21331] ? klist_children_put+0x4a/0x60 [ 289.605480][T21331] ? klist_put+0xdc/0x180 [ 289.609795][T21331] device_del+0x8b4/0xc40 [ 289.614111][T21331] ? __device_links_no_driver+0x250/0x250 [ 289.619822][T21331] ? mark_held_locks+0xa4/0xf0 [ 289.624581][T21331] ? _raw_spin_unlock_irq+0x28/0x90 [ 289.629783][T21331] ? __input_unregister_device+0x153/0x4a0 [ 289.635576][T21331] ? _raw_spin_unlock_irq+0x28/0x90 [ 289.640941][T21331] cdev_device_del+0x1a/0x80 [ 289.645518][T21331] evdev_disconnect+0x42/0xb0 [ 289.650177][T21331] __input_unregister_device+0x200/0x4a0 [ 289.655798][T21331] input_unregister_device+0xc5/0x110 [ 289.661156][T21331] uinput_destroy_device+0x1f4/0x250 [ 289.666433][T21331] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 289.672342][T21331] ? tomoyo_domain+0xc5/0x160 [ 289.677008][T21331] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 289.683254][T21331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.689486][T21331] ? tomoyo_path_number_perm+0x263/0x520 [ 289.695253][T21331] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 289.701191][T21331] ? __fget+0x35a/0x550 [ 289.705355][T21331] uinput_ioctl+0x4a/0x60 [ 289.709703][T21331] ? uinput_compat_ioctl+0x90/0x90 [ 289.714803][T21331] do_vfs_ioctl+0xd6e/0x1390 [ 289.719684][T21331] ? ioctl_preallocate+0x210/0x210 [ 289.724799][T21331] ? __fget+0x381/0x550 [ 289.728948][T21331] ? ksys_dup3+0x3e0/0x3e0 [ 289.733357][T21331] ? tomoyo_file_ioctl+0x23/0x30 [ 289.738289][T21331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.744673][T21331] ? security_file_ioctl+0x93/0xc0 [ 289.749793][T21331] ksys_ioctl+0xab/0xd0 [ 289.755513][T21331] __x64_sys_ioctl+0x73/0xb0 [ 289.760284][T21331] do_syscall_64+0x103/0x610 [ 289.764891][T21331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.771342][T21331] RIP: 0033:0x458da9 [ 289.775232][T21331] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.795000][T21331] RSP: 002b:00007fd65b180c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.803487][T21331] RAX: ffffffffffffffda RBX: 00007fd65b180c90 RCX: 0000000000458da9 [ 289.811663][T21331] RDX: 0000000000000000 RSI: 0000000000005502 RDI: 0000000000000003 [ 289.819653][T21331] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 289.827616][T21331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65b1816d4 [ 289.835578][T21331] R13: 00000000004c362f R14: 00000000004d6ad0 R15: 0000000000000006 20:47:05 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb060080f00f000075d79fc8fd1d086d090000cebc00000000"], 0x0, 0x1a}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f00000000c0)) 20:47:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/uev/input/event#\x00', 0x4, 0x0) 20:47:05 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x0, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:05 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:05 executing program 2 (fault-call:6 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/xev/input/event#\x00', 0x4, 0x0) [ 290.041723][T21455] input: syz1 as /devices/virtual/input/input99 [ 290.072143][T21455] FAULT_INJECTION: forcing a failure. [ 290.072143][T21455] name failslab, interval 1, probability 0, space 0, times 0 [ 290.112043][T21455] CPU: 1 PID: 21455 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 290.120065][T21455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.130129][T21455] Call Trace: [ 290.133536][T21455] dump_stack+0x172/0x1f0 [ 290.137888][T21455] should_fail.cold+0xa/0x15 [ 290.142947][T21455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 290.148777][T21455] ? ___might_sleep+0x163/0x280 [ 290.153754][T21455] __should_failslab+0x121/0x190 [ 290.158705][T21455] should_failslab+0x9/0x14 [ 290.163233][T21455] kmem_cache_alloc_trace+0x2d1/0x760 [ 290.168633][T21455] ? mutex_trylock+0x1e0/0x1e0 [ 290.173405][T21455] ? kasan_check_write+0x14/0x20 [ 290.178358][T21455] kobject_uevent_env+0x2fb/0x1030 [ 290.183479][T21455] ? wait_for_completion+0x440/0x440 [ 290.188784][T21455] kobject_uevent+0x20/0x26 [ 290.193298][T21455] device_del+0x758/0xc40 [ 290.197646][T21455] ? __device_links_no_driver+0x250/0x250 [ 290.203387][T21455] ? _raw_spin_unlock_irq+0x28/0x90 [ 290.208624][T21455] ? __input_unregister_device+0x153/0x4a0 [ 290.214905][T21455] ? _raw_spin_unlock_irq+0x28/0x90 [ 290.220394][T21455] cdev_device_del+0x1a/0x80 [ 290.225001][T21455] evdev_disconnect+0x42/0xb0 [ 290.229707][T21455] __input_unregister_device+0x200/0x4a0 [ 290.235586][T21455] input_unregister_device+0xc5/0x110 [ 290.241177][T21455] uinput_destroy_device+0x1f4/0x250 [ 290.246567][T21455] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 290.252486][T21455] ? tomoyo_domain+0xc5/0x160 [ 290.257209][T21455] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 290.263298][T21455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.269551][T21455] ? tomoyo_path_number_perm+0x263/0x520 [ 290.275197][T21455] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 290.281117][T21455] ? __fget+0x35a/0x550 [ 290.285299][T21455] uinput_ioctl+0x4a/0x60 [ 290.289642][T21455] ? uinput_compat_ioctl+0x90/0x90 [ 290.294766][T21455] do_vfs_ioctl+0xd6e/0x1390 [ 290.299448][T21455] ? ioctl_preallocate+0x210/0x210 [ 290.304655][T21455] ? __fget+0x381/0x550 [ 290.309040][T21455] ? ksys_dup3+0x3e0/0x3e0 [ 290.313480][T21455] ? tomoyo_file_ioctl+0x23/0x30 [ 290.318434][T21455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.324700][T21455] ? security_file_ioctl+0x93/0xc0 [ 290.329805][T21455] ksys_ioctl+0xab/0xd0 [ 290.333957][T21455] __x64_sys_ioctl+0x73/0xb0 [ 290.338545][T21455] do_syscall_64+0x103/0x610 [ 290.343239][T21455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.349312][T21455] RIP: 0033:0x458da9 [ 290.353341][T21455] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.375879][T21455] RSP: 002b:00007fd65b180c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.384372][T21455] RAX: ffffffffffffffda RBX: 00007fd65b180c90 RCX: 0000000000458da9 [ 290.392443][T21455] RDX: 0000000000000000 RSI: 0000000000005502 RDI: 0000000000000003 [ 290.400726][T21455] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:47:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES64=r0, @ANYRESDEC=r0, @ANYRESOCT=r0]], 0x0, 0xff8c, 0xc5, 0x100000000000}, 0xffffffffffffff56) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r0}) socket$rds(0x15, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x1, 0x90a00) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x130) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f00000001c0)={'bond_slave_0\x00', 0x4, 0x1}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'bridge_slave_0\x00', {0x2, 0x4e22, @loopback}}) 20:47:05 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 290.410426][T21455] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65b1816d4 [ 290.418397][T21455] R13: 00000000004c362f R14: 00000000004d6ad0 R15: 0000000000000006 20:47:05 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/d.v/input/event#\x00', 0x4, 0x0) 20:47:05 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x0, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:06 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:06 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/d/v/input/event#\x00', 0x4, 0x0) 20:47:06 executing program 2 (fault-call:6 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:06 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x0, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 290.752678][T21597] input: syz1 as /devices/virtual/input/input100 [ 290.836467][T21607] FAULT_INJECTION: forcing a failure. [ 290.836467][T21607] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 290.849717][T21607] CPU: 0 PID: 21607 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 290.857709][T21607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.867954][T21607] Call Trace: [ 290.871267][T21607] dump_stack+0x172/0x1f0 [ 290.875619][T21607] should_fail.cold+0xa/0x15 [ 290.880232][T21607] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 290.886433][T21607] ? __lock_acquire+0x548/0x3fb0 [ 290.891475][T21607] ? trace_hardirqs_on+0x67/0x230 [ 290.896817][T21607] should_fail_alloc_page+0x50/0x60 [ 290.902393][T21607] __alloc_pages_nodemask+0x1a1/0x8d0 [ 290.907777][T21607] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 290.914287][T21607] ? find_held_lock+0x35/0x130 [ 290.919088][T21607] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 290.924914][T21607] cache_grow_begin+0x9c/0x860 [ 290.930002][T21607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.936262][T21607] kmem_cache_alloc_trace+0x67f/0x760 [ 290.941646][T21607] ? mutex_trylock+0x1e0/0x1e0 [ 290.946428][T21607] ? kasan_check_write+0x14/0x20 [ 290.951381][T21607] kobject_uevent_env+0x2fb/0x1030 [ 290.956592][T21607] ? wait_for_completion+0x440/0x440 [ 290.962157][T21607] kobject_uevent+0x20/0x26 [ 290.966759][T21607] device_del+0x758/0xc40 [ 290.971106][T21607] ? __device_links_no_driver+0x250/0x250 [ 290.976831][T21607] ? _raw_spin_unlock_irq+0x28/0x90 20:47:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 290.982128][T21607] ? __input_unregister_device+0x153/0x4a0 [ 290.987944][T21607] ? _raw_spin_unlock_irq+0x28/0x90 [ 290.993156][T21607] cdev_device_del+0x1a/0x80 [ 290.997770][T21607] evdev_disconnect+0x42/0xb0 [ 291.002469][T21607] __input_unregister_device+0x200/0x4a0 [ 291.008393][T21607] input_unregister_device+0xc5/0x110 [ 291.013958][T21607] uinput_destroy_device+0x1f4/0x250 [ 291.019271][T21607] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 291.025202][T21607] ? tomoyo_domain+0xc5/0x160 [ 291.029894][T21607] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 291.035975][T21607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.042235][T21607] ? tomoyo_path_number_perm+0x263/0x520 [ 291.048231][T21607] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 291.054068][T21607] ? __fget+0x35a/0x550 [ 291.058235][T21607] uinput_ioctl+0x4a/0x60 [ 291.062926][T21607] ? uinput_compat_ioctl+0x90/0x90 [ 291.068057][T21607] do_vfs_ioctl+0xd6e/0x1390 [ 291.072685][T21607] ? ioctl_preallocate+0x210/0x210 [ 291.077812][T21607] ? __fget+0x381/0x550 [ 291.081989][T21607] ? ksys_dup3+0x3e0/0x3e0 [ 291.086430][T21607] ? tomoyo_file_ioctl+0x23/0x30 [ 291.091382][T21607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.097637][T21607] ? security_file_ioctl+0x93/0xc0 [ 291.102756][T21607] ksys_ioctl+0xab/0xd0 [ 291.106918][T21607] __x64_sys_ioctl+0x73/0xb0 [ 291.111522][T21607] do_syscall_64+0x103/0x610 [ 291.116243][T21607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.122141][T21607] RIP: 0033:0x458da9 [ 291.126036][T21607] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.145728][T21607] RSP: 002b:00007fd65b15fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.154149][T21607] RAX: ffffffffffffffda RBX: 00007fd65b15fc90 RCX: 0000000000458da9 [ 291.162123][T21607] RDX: 0000000000000000 RSI: 0000000000005502 RDI: 0000000000000003 [ 291.170267][T21607] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 291.178231][T21607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65b1606d4 20:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/.nput/event#\x00', 0x4, 0x0) 20:47:06 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 291.186225][T21607] R13: 00000000004c362f R14: 00000000004d6ad0 R15: 0000000000000006 20:47:06 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file1\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000380)=ANY=[@ANYBLOB="01000a0079e2dc2533ffaaaaaab8aa280000000000000180c20000020180c20000010180c2000003000000000000bbaaaaaacd013339aabbaaaabaaaaabb0000000000000b9bb675384b7b292fd9b2a39bfe28001df44765e91e7fa90accfcf1a95197f40cbabf69f4c482af8497432fa147d4013af3d24ee758398bc5747525b53cfbcabec6bc3a285c89b88b6a83b81810f6389f54e48dd7bca444e221a0aefd2c95b42f720a9406474c0acbc1297be8c7a9b19f9d25e089df0190dc1518652e75347985863dbdec3e459999f308909f63f88e1e39637231623053"]) rename(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') 20:47:06 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:06 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:06 executing program 2 (fault-call:6 fault-nth:3): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev//nput/event#\x00', 0x4, 0x0) 20:47:06 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 291.423194][T21737] input: syz1 as /devices/virtual/input/input101 20:47:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/.vent#\x00', 0x4, 0x0) [ 291.465291][T21742] FAULT_INJECTION: forcing a failure. [ 291.465291][T21742] name failslab, interval 1, probability 0, space 0, times 0 [ 291.490544][T21742] CPU: 0 PID: 21742 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 291.498567][T21742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.508627][T21742] Call Trace: [ 291.508659][T21742] dump_stack+0x172/0x1f0 [ 291.508680][T21742] should_fail.cold+0xa/0x15 [ 291.508698][T21742] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 291.508720][T21742] ? ___might_sleep+0x163/0x280 [ 291.516861][T21742] __should_failslab+0x121/0x190 [ 291.516877][T21742] should_failslab+0x9/0x14 [ 291.516894][T21742] __kmalloc_track_caller+0x2d8/0x740 [ 291.516907][T21742] ? pointer+0xa30/0xa30 [ 291.516925][T21742] ? kasprintf+0xbb/0xf0 [ 291.516941][T21742] kvasprintf+0xc8/0x170 [ 291.516955][T21742] ? bust_spinlocks+0xe0/0xe0 20:47:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input//vent#\x00', 0x4, 0x0) [ 291.516973][T21742] ? pointer+0xa30/0xa30 [ 291.516987][T21742] kasprintf+0xbb/0xf0 [ 291.517001][T21742] ? kvasprintf_const+0x190/0x190 [ 291.517019][T21742] ? cleanup_uevent_env+0x50/0x50 [ 291.517038][T21742] ? input_default_getkeycode+0x520/0x520 [ 291.517048][T21742] input_devnode+0x4c/0x90 [ 291.517061][T21742] device_get_devnode+0x175/0x2e0 [ 291.517076][T21742] dev_uevent+0x3e8/0x580 [ 291.517097][T21742] ? device_get_devnode+0x2e0/0x2e0 [ 291.608303][T21742] ? kobject_uevent_env+0x2fb/0x1030 [ 291.613619][T21742] ? rcu_read_lock_sched_held+0x110/0x130 [ 291.619365][T21742] ? device_get_devnode+0x2e0/0x2e0 [ 291.624585][T21742] kobject_uevent_env+0x487/0x1030 [ 291.629737][T21742] ? wait_for_completion+0x440/0x440 [ 291.635060][T21742] kobject_uevent+0x20/0x26 [ 291.639596][T21742] device_del+0x758/0xc40 [ 291.643965][T21742] ? __device_links_no_driver+0x250/0x250 [ 291.649699][T21742] ? _raw_spin_unlock_irq+0x28/0x90 [ 291.654914][T21742] ? __input_unregister_device+0x153/0x4a0 [ 291.660734][T21742] ? _raw_spin_unlock_irq+0x28/0x90 20:47:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/ev.nt#\x00', 0x4, 0x0) [ 291.665951][T21742] cdev_device_del+0x1a/0x80 [ 291.670562][T21742] evdev_disconnect+0x42/0xb0 [ 291.675255][T21742] __input_unregister_device+0x200/0x4a0 [ 291.680910][T21742] input_unregister_device+0xc5/0x110 [ 291.686302][T21742] uinput_destroy_device+0x1f4/0x250 [ 291.691620][T21742] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 291.697551][T21742] ? tomoyo_domain+0xc5/0x160 [ 291.702253][T21742] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 291.708338][T21742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:47:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 291.714684][T21742] ? tomoyo_path_number_perm+0x263/0x520 [ 291.720343][T21742] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 291.726281][T21742] ? __fget+0x35a/0x550 [ 291.730466][T21742] uinput_ioctl+0x4a/0x60 [ 291.734804][T21742] ? uinput_compat_ioctl+0x90/0x90 [ 291.740029][T21742] do_vfs_ioctl+0xd6e/0x1390 [ 291.744814][T21742] ? ioctl_preallocate+0x210/0x210 [ 291.749952][T21742] ? __fget+0x381/0x550 [ 291.754488][T21742] ? ksys_dup3+0x3e0/0x3e0 [ 291.758905][T21742] ? tomoyo_file_ioctl+0x23/0x30 [ 291.763846][T21742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.770105][T21742] ? security_file_ioctl+0x93/0xc0 [ 291.770127][T21742] ksys_ioctl+0xab/0xd0 [ 291.770147][T21742] __x64_sys_ioctl+0x73/0xb0 [ 291.770165][T21742] do_syscall_64+0x103/0x610 [ 291.770184][T21742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.770195][T21742] RIP: 0033:0x458da9 [ 291.770212][T21742] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.779654][T21742] RSP: 002b:00007fd65b15fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.779670][T21742] RAX: ffffffffffffffda RBX: 00007fd65b15fc90 RCX: 0000000000458da9 [ 291.779679][T21742] RDX: 0000000000000000 RSI: 0000000000005502 RDI: 0000000000000003 [ 291.779688][T21742] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 291.779697][T21742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65b1606d4 20:47:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/ev/nt#\x00', 0x4, 0x0) 20:47:07 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 291.779705][T21742] R13: 00000000004c362f R14: 00000000004d6ad0 R15: 0000000000000006 20:47:07 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x02', 0x4, 0x0) 20:47:07 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d159054", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:07 executing program 2 (fault-call:6 fault-nth:4): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:07 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:07 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x03', 0x4, 0x0) [ 292.095143][T21783] input: syz1 as /devices/virtual/input/input102 20:47:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 292.157550][T21790] FAULT_INJECTION: forcing a failure. [ 292.157550][T21790] name failslab, interval 1, probability 0, space 0, times 0 20:47:07 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 292.200240][T21790] CPU: 1 PID: 21790 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 292.208286][T21790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.218443][T21790] Call Trace: [ 292.221761][T21790] dump_stack+0x172/0x1f0 [ 292.226130][T21790] should_fail.cold+0xa/0x15 [ 292.230746][T21790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 292.236671][T21790] ? ___might_sleep+0x163/0x280 [ 292.241627][T21790] __should_failslab+0x121/0x190 [ 292.246580][T21790] should_failslab+0x9/0x14 [ 292.251106][T21790] kmem_cache_alloc_node+0x264/0x710 [ 292.256495][T21790] ? find_held_lock+0x35/0x130 [ 292.261281][T21790] __alloc_skb+0xd5/0x5e0 [ 292.265627][T21790] ? skb_trim+0x190/0x190 [ 292.270594][T21790] ? kasan_check_read+0x11/0x20 [ 292.275465][T21790] alloc_uevent_skb+0x83/0x1e2 [ 292.280250][T21790] kobject_uevent_env+0xa63/0x1030 [ 292.285688][T21790] ? wait_for_completion+0x440/0x440 [ 292.291091][T21790] kobject_uevent+0x20/0x26 [ 292.295601][T21790] device_del+0x758/0xc40 [ 292.301346][T21790] ? __device_links_no_driver+0x250/0x250 [ 292.307105][T21790] ? _raw_spin_unlock_irq+0x28/0x90 [ 292.312473][T21790] ? __input_unregister_device+0x153/0x4a0 [ 292.318274][T21790] ? _raw_spin_unlock_irq+0x28/0x90 [ 292.323479][T21790] cdev_device_del+0x1a/0x80 [ 292.328070][T21790] evdev_disconnect+0x42/0xb0 [ 292.333021][T21790] __input_unregister_device+0x200/0x4a0 [ 292.338645][T21790] input_unregister_device+0xc5/0x110 [ 292.344196][T21790] uinput_destroy_device+0x1f4/0x250 [ 292.349473][T21790] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 292.355352][T21790] ? tomoyo_domain+0xc5/0x160 [ 292.360101][T21790] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 292.366353][T21790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.372582][T21790] ? tomoyo_path_number_perm+0x263/0x520 [ 292.378385][T21790] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 292.384984][T21790] ? __fget+0x35a/0x550 [ 292.389170][T21790] uinput_ioctl+0x4a/0x60 [ 292.393487][T21790] ? uinput_compat_ioctl+0x90/0x90 [ 292.398597][T21790] do_vfs_ioctl+0xd6e/0x1390 [ 292.403323][T21790] ? ioctl_preallocate+0x210/0x210 [ 292.408564][T21790] ? __fget+0x381/0x550 [ 292.412727][T21790] ? ksys_dup3+0x3e0/0x3e0 [ 292.417168][T21790] ? tomoyo_file_ioctl+0x23/0x30 [ 292.422269][T21790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.428492][T21790] ? security_file_ioctl+0x93/0xc0 [ 292.433600][T21790] ksys_ioctl+0xab/0xd0 [ 292.437760][T21790] __x64_sys_ioctl+0x73/0xb0 [ 292.442343][T21790] do_syscall_64+0x103/0x610 [ 292.447752][T21790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.453646][T21790] RIP: 0033:0x458da9 [ 292.457525][T21790] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.477118][T21790] RSP: 002b:00007fd65b15fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.485514][T21790] RAX: ffffffffffffffda RBX: 00007fd65b15fc90 RCX: 0000000000458da9 [ 292.493495][T21790] RDX: 0000000000000000 RSI: 0000000000005502 RDI: 0000000000000003 [ 292.501460][T21790] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 292.509424][T21790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65b1606d4 [ 292.517390][T21790] R13: 00000000004c362f R14: 00000000004d6ad0 R15: 0000000000000006 20:47:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x04', 0x4, 0x0) 20:47:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000040)={0x0, 0x0, @ioapic}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000000)='./control\x00', 0x0) r2 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000180)) write$P9_RREMOVE(r2, &(0x7f0000000140)={0x7, 0x7b, 0x2}, 0x7) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000002c0)={0x220}) 20:47:08 executing program 2 (fault-call:6 fault-nth:5): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x05', 0x4, 0x0) [ 292.796804][T21827] input: syz1 as /devices/virtual/input/input103 [ 292.820784][T21827] FAULT_INJECTION: forcing a failure. [ 292.820784][T21827] name failslab, interval 1, probability 0, space 0, times 0 [ 292.862708][T21827] CPU: 1 PID: 21827 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 292.870733][T21827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.880795][T21827] Call Trace: [ 292.884098][T21827] dump_stack+0x172/0x1f0 [ 292.888453][T21827] should_fail.cold+0xa/0x15 [ 292.893062][T21827] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 292.898887][T21827] ? ___might_sleep+0x163/0x280 [ 292.903729][T21827] __should_failslab+0x121/0x190 20:47:08 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xd0, &(0x7f0000b67000), &(0x7f0000000000)=0x4) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000a0a000/0x2000)=nil, 0x2000, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="74e2018f4da6f11e123655426fdf98815693cce62ee73c87171423c00e7609c8adef8e4d01edb9caf0674e32f75ad9c10696e37c98bf431742d93230e2e108aa0d6f2719d8e51e97cf2b35ce618086a0d766c57b0f8f1cd2551c1131a6274be5a334aa536f0a64d059812b58ca314b9dd26cd6402fc8760a343fdc9ae764e60dd08517426d332dc3", 0x88}], 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) 20:47:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) [ 292.908672][T21827] should_failslab+0x9/0x14 [ 292.913372][T21827] kmem_cache_alloc_node_trace+0x270/0x720 [ 292.919202][T21827] __kmalloc_node_track_caller+0x3d/0x70 [ 292.925231][T21827] __kmalloc_reserve.isra.0+0x40/0xf0 [ 292.930625][T21827] __alloc_skb+0x10b/0x5e0 [ 292.935322][T21827] ? skb_trim+0x190/0x190 [ 292.939682][T21827] ? kasan_check_read+0x11/0x20 [ 292.944552][T21827] alloc_uevent_skb+0x83/0x1e2 [ 292.949340][T21827] kobject_uevent_env+0xa63/0x1030 [ 292.954475][T21827] ? wait_for_completion+0x440/0x440 [ 292.959776][T21827] kobject_uevent+0x20/0x26 [ 292.964295][T21827] device_del+0x758/0xc40 [ 292.968652][T21827] ? __device_links_no_driver+0x250/0x250 [ 292.974391][T21827] ? _raw_spin_unlock_irq+0x28/0x90 [ 292.979694][T21827] ? __input_unregister_device+0x153/0x4a0 [ 292.985516][T21827] ? _raw_spin_unlock_irq+0x28/0x90 [ 292.990831][T21827] cdev_device_del+0x1a/0x80 [ 292.995438][T21827] evdev_disconnect+0x42/0xb0 [ 293.000138][T21827] __input_unregister_device+0x200/0x4a0 [ 293.005796][T21827] input_unregister_device+0xc5/0x110 [ 293.011204][T21827] uinput_destroy_device+0x1f4/0x250 [ 293.016508][T21827] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 293.022416][T21827] ? tomoyo_domain+0xc5/0x160 [ 293.027123][T21827] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 293.033207][T21827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.039475][T21827] ? tomoyo_path_number_perm+0x263/0x520 [ 293.045135][T21827] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 293.050971][T21827] ? __fget+0x35a/0x550 [ 293.055148][T21827] uinput_ioctl+0x4a/0x60 [ 293.059591][T21827] ? uinput_compat_ioctl+0x90/0x90 [ 293.064720][T21827] do_vfs_ioctl+0xd6e/0x1390 [ 293.069345][T21827] ? ioctl_preallocate+0x210/0x210 [ 293.074473][T21827] ? __fget+0x381/0x550 [ 293.078740][T21827] ? ksys_dup3+0x3e0/0x3e0 [ 293.083208][T21827] ? tomoyo_file_ioctl+0x23/0x30 [ 293.088156][T21827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.094421][T21827] ? security_file_ioctl+0x93/0xc0 [ 293.099536][T21827] ksys_ioctl+0xab/0xd0 [ 293.103685][T21827] __x64_sys_ioctl+0x73/0xb0 [ 293.108267][T21827] do_syscall_64+0x103/0x610 [ 293.112863][T21827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.118944][T21827] RIP: 0033:0x458da9 [ 293.122853][T21827] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.142880][T21827] RSP: 002b:00007fd65b180c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.151279][T21827] RAX: ffffffffffffffda RBX: 00007fd65b180c90 RCX: 0000000000458da9 20:47:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x0, 0x0) sendto$ax25(r1, &(0x7f0000000000), 0x0, 0x80, &(0x7f0000000040)={{0x3, @default, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) read(r1, 0x0, 0x0) 20:47:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x06', 0x4, 0x0) [ 293.159239][T21827] RDX: 0000000000000000 RSI: 0000000000005502 RDI: 0000000000000003 [ 293.167223][T21827] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 293.175260][T21827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65b1816d4 [ 293.184121][T21827] R13: 00000000004c362f R14: 00000000004d6ad0 R15: 0000000000000006 20:47:08 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='dax\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000500)='.\x00', &(0x7f00000004c0)='./file0\x00') r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x200800, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) stat(&(0x7f0000000280)='./file0/../file0/file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000340)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r1}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) utimensat(r2, &(0x7f00000000c0)='./file0/../file0/file0\x00', &(0x7f0000000100)={{}, {0x0, 0x2710}}, 0x100) umount2(&(0x7f00000001c0)='./file0/../file0/file0\x00', 0x80000000002) 20:47:08 executing program 2 (fault-call:6 fault-nth:6): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\a', 0x4, 0x0) 20:47:08 executing program 0: unshare(0x400) syz_execute_func(&(0x7f0000000200)="9504b70f05c463694a1200e4bf72724a4af00f298f17955bf95bf9f23e26220fa0e5be34d1c4e1f9c421fcc3d7656479eac40fbb0198e8e80000000fbfce0f73d5397e0041d9e92644a5b6b6470fbb7508f24d0f2d9600000000c4c1fd5bbd4c45b5428787440f2b550126e0000f38048302000000") [ 293.455233][T21871] input: syz1 as /devices/virtual/input/input104 20:47:08 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:08 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:09 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', 0x0, &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f5796d2862196d6f6", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#H', 0x4, 0x0) [ 293.520576][T21876] FAULT_INJECTION: forcing a failure. [ 293.520576][T21876] name failslab, interval 1, probability 0, space 0, times 0 20:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#L', 0x4, 0x0) [ 293.586021][T21876] CPU: 1 PID: 21876 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 293.594047][T21876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.604420][T21876] Call Trace: [ 293.607732][T21876] dump_stack+0x172/0x1f0 [ 293.612081][T21876] should_fail.cold+0xa/0x15 [ 293.616692][T21876] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 293.622521][T21876] ? ___might_sleep+0x163/0x280 [ 293.627405][T21876] __should_failslab+0x121/0x190 20:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#h', 0x4, 0x0) 20:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#l', 0x4, 0x0) [ 293.632441][T21876] should_failslab+0x9/0x14 [ 293.637054][T21876] kmem_cache_alloc+0x2b2/0x6f0 [ 293.641917][T21876] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 293.647823][T21876] ? lock_downgrade+0x880/0x880 [ 293.652696][T21876] skb_clone+0x150/0x3b0 [ 293.657024][T21876] netlink_broadcast_filtered+0x870/0xb20 [ 293.662817][T21876] netlink_broadcast+0x3a/0x50 [ 293.667609][T21876] kobject_uevent_env+0xa94/0x1030 [ 293.672742][T21876] ? wait_for_completion+0x440/0x440 [ 293.678045][T21876] kobject_uevent+0x20/0x26 20:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#t', 0x4, 0x0) [ 293.682561][T21876] device_del+0x758/0xc40 [ 293.686974][T21876] ? __device_links_no_driver+0x250/0x250 [ 293.692817][T21876] ? _raw_spin_unlock_irq+0x28/0x90 [ 293.698031][T21876] ? __input_unregister_device+0x153/0x4a0 [ 293.703854][T21876] ? _raw_spin_unlock_irq+0x28/0x90 [ 293.709073][T21876] cdev_device_del+0x1a/0x80 [ 293.713773][T21876] evdev_disconnect+0x42/0xb0 [ 293.718735][T21876] __input_unregister_device+0x200/0x4a0 [ 293.724477][T21876] input_unregister_device+0xc5/0x110 [ 293.729869][T21876] uinput_destroy_device+0x1f4/0x250 20:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#z', 0x4, 0x0) [ 293.735169][T21876] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 293.741158][T21876] ? tomoyo_domain+0xc5/0x160 [ 293.745853][T21876] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 293.752211][T21876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.758522][T21876] ? tomoyo_path_number_perm+0x263/0x520 [ 293.764184][T21876] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 293.770023][T21876] ? __fget+0x35a/0x550 [ 293.774204][T21876] uinput_ioctl+0x4a/0x60 [ 293.778721][T21876] ? uinput_compat_ioctl+0x90/0x90 [ 293.784448][T21876] do_vfs_ioctl+0xd6e/0x1390 [ 293.789146][T21876] ? ioctl_preallocate+0x210/0x210 [ 293.794441][T21876] ? __fget+0x381/0x550 [ 293.798723][T21876] ? ksys_dup3+0x3e0/0x3e0 [ 293.803258][T21876] ? tomoyo_file_ioctl+0x23/0x30 [ 293.808408][T21876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.814691][T21876] ? security_file_ioctl+0x93/0xc0 [ 293.819937][T21876] ksys_ioctl+0xab/0xd0 [ 293.824084][T21876] __x64_sys_ioctl+0x73/0xb0 [ 293.829285][T21876] do_syscall_64+0x103/0x610 [ 293.834025][T21876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.843937][T21876] RIP: 0033:0x458da9 [ 293.847883][T21876] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.867767][T21876] RSP: 002b:00007fd65b15fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.876284][T21876] RAX: ffffffffffffffda RBX: 00007fd65b15fc90 RCX: 0000000000458da9 [ 293.884251][T21876] RDX: 0000000000000000 RSI: 0000000000005502 RDI: 0000000000000003 [ 293.892210][T21876] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 293.900272][T21876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65b1606d4 [ 293.908564][T21876] R13: 00000000004c362f R14: 00000000004d6ad0 R15: 0000000000000006 20:47:09 executing program 2 (fault-call:6 fault-nth:7): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 20:47:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) 20:47:09 executing program 0: unshare(0x400) syz_execute_func(&(0x7f0000000200)="9504b70f05c463694a1200e4bf72724a4af00f298f17955bf95bf9f23e26220fa0e5be34d1c4e1f9c421fcc3d7656479eac40fbb0198e8e80000000fbfce0f73d5397e0041d9e92644a5b6b6470fbb7508f24d0f2d9600000000c4c1fd5bbd4c45b5428787440f2b550126e0000f38048302000000") 20:47:09 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:09 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:09 executing program 0: unshare(0x400) syz_execute_func(&(0x7f0000000200)="9504b70f05c463694a1200e4bf72724a4af00f298f17955bf95bf9f23e26220fa0e5be34d1c4e1f9c421fcc3d7656479eac40fbb0198e8e80000000fbfce0f73d5397e0041d9e92644a5b6b6470fbb7508f24d0f2d9600000000c4c1fd5bbd4c45b5428787440f2b550126e0000f38048302000000") [ 294.253049][T22021] input: syz1 as /devices/virtual/input/input105 20:47:09 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:09 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) 20:47:09 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) msgctl$IPC_RMID(0x0, 0x0) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000c40)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303d307830303030303030ba33a1b0353030303030303030342cc1773d3078303030303030303030303030303030302c73713d30783030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d656f75743d30783030303030303130303027f40870a5e9786b6f774ac965f6862b1bf86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62671e683006b677732d06d6bd884d12ffa10a9da4e317fc91f6f77e757b65402aeca3d2cf842a6b34da868c28a1cd46b77ef794c4b1faffff3154fe9f2f368138c7f0e30de1f384805daf14bb992c6899200d3161096ac4fa5147f11841c61ab59527ed4deba5273f79b4356575e3f14f4b1c3267a0e1b469ba13fea6048c71f0dbb0a1795e315d3d56fb90db6daaaf1fb26db3c051e191daa0dfe0d8e739f3131aa405f482a1643494904de28594724ea5956b5c81d07c8e14f8ee8625db11d08ecb6a09c1d9448ccb5fba2d4f733f5d545b2eeb8e254c3168032876a3b5c37f9603e2e88d1590543e9ac13dc726d50063680000bc06ed0ae9baf0dd610f6ed8f11445525de07df5ce6b33d24fb351cc1b785514694b00000000002348869b3f", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r5, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000040)=""/125) [ 294.307727][T22021] FAULT_INJECTION: forcing a failure. [ 294.307727][T22021] name failslab, interval 1, probability 0, space 0, times 0 [ 294.342391][T22021] CPU: 1 PID: 22021 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 294.350502][T22021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.360573][T22021] Call Trace: [ 294.363898][T22021] dump_stack+0x172/0x1f0 [ 294.368261][T22021] should_fail.cold+0xa/0x15 [ 294.372883][T22021] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 294.379253][T22021] ? ___might_sleep+0x163/0x280 [ 294.384595][T22021] __should_failslab+0x121/0x190 [ 294.389643][T22021] should_failslab+0x9/0x14 [ 294.394644][T22021] kmem_cache_alloc_trace+0x2d1/0x760 [ 294.401020][T22021] ? kasan_check_write+0x14/0x20 [ 294.406419][T22021] kobject_uevent_env+0x2fb/0x1030 [ 294.411549][T22021] ? wait_for_completion+0x440/0x440 [ 294.416875][T22021] kobject_uevent+0x20/0x26 [ 294.421391][T22021] device_del+0x758/0xc40 [ 294.425749][T22021] ? __device_links_no_driver+0x250/0x250 [ 294.431660][T22021] ? trace_hardirqs_on+0x67/0x230 [ 294.436731][T22021] __input_unregister_device+0x3a4/0x4a0 [ 294.442517][T22021] input_unregister_device+0xc5/0x110 [ 294.447932][T22021] uinput_destroy_device+0x1f4/0x250 [ 294.447954][T22021] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 294.447969][T22021] ? tomoyo_domain+0xc5/0x160 [ 294.447986][T22021] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 294.448008][T22021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.459162][T22021] ? tomoyo_path_number_perm+0x263/0x520 [ 294.459180][T22021] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 294.459216][T22021] ? __fget+0x35a/0x550 [ 294.459238][T22021] uinput_ioctl+0x4a/0x60 [ 294.459250][T22021] ? uinput_compat_ioctl+0x90/0x90 [ 294.459265][T22021] do_vfs_ioctl+0xd6e/0x1390 20:47:10 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x216d, 0x301080) r2 = getpid() r3 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000004000000bdb8000010000000000000b26f5f67500d0306c0b3d6f6984bbf980020000200"/52], 0x1, 0x0) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r3, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_QUERYMENU(r5, 0xc02c5625, &(0x7f0000000080)={0x8001, 0x6, @name="baa73deb2bd08df531645331ba7e48523ec07c46f0134663290f6c6b796e00ad"}) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0]) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x40046109, &(0x7f0000000040)={0xcc, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x2, 0x3, 0x1, 0x7, 'syz0\x00'}, 0x1, 0x8, 0x4b, r2, 0x0, 0x200, 'syz1\x00', 0x0, 0x0, [], [0x8, 0x1, 0xffffffffffffff7f, 0x80000000]}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b7000000ffffffc04d000000000000000000000073bcaf80006ca76778825f775b11315d72edd71befa9a869e97ac1e1192c5c0177d42353e076aa1dceeeebe8c1a8310c375d3199ef5c23571eca5afc12cec84a0e80d955d77976d889f74a8db539ac24206c89c079d26f592a8b61c9950bc92a0108bced2694a600dd75f2f1"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c4, 0x10, 0x0}, 0x1d3) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r6, &(0x7f0000000000)=[{{}, 0x1, 0x2, 0x2}], 0x1c3) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000040)=""/125) 20:47:10 executing program 0: unshare(0x400) syz_execute_func(&(0x7f0000000200)="9504b70f05c463694a1200e4bf72724a4af00f298f17955bf95bf9f23e26220fa0e5be34d1c4e1f9c421fcc3d7656479eac40fbb0198e8e80000000fbfce0f73d5397e0041d9e92644a5b6b6470fbb7508f24d0f2d9600000000c4c1fd5bbd4c45b5428787440f2b550126e0000f38048302000000") [ 294.459283][T22021] ? ioctl_preallocate+0x210/0x210 [ 294.459302][T22021] ? __fget+0x381/0x550 [ 294.470131][T22021] ? ksys_dup3+0x3e0/0x3e0 [ 294.470157][T22021] ? tomoyo_file_ioctl+0x23/0x30 [ 294.470174][T22021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.470202][T22021] ? security_file_ioctl+0x93/0xc0 [ 294.482134][T22021] ksys_ioctl+0xab/0xd0 [ 294.482154][T22021] __x64_sys_ioctl+0x73/0xb0 [ 294.482173][T22021] do_syscall_64+0x103/0x610 [ 294.482201][T22021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.482214][T22021] RIP: 0033:0x458da9 [ 294.482226][T22021] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.482238][T22021] RSP: 002b:00007fd65b180c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.492171][T22021] RAX: ffffffffffffffda RBX: 00007fd65b180c90 RCX: 0000000000458da9 [ 294.492181][T22021] RDX: 0000000000000000 RSI: 0000000000005502 RDI: 0000000000000003 [ 294.492199][T22021] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 294.492208][T22021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65b1816d4 [ 294.492217][T22021] R13: 00000000004c362f R14: 00000000004d6ad0 R15: 0000000000000006 [ 294.637563][T22020] ================================================================== [ 294.646425][T22020] BUG: KASAN: use-after-free in string+0x208/0x230 [ 294.646443][T22020] Read of size 1 at addr ffff8880a7c81700 by task syz-executor.2/22020 [ 294.646445][T22020] [ 294.646459][T22020] CPU: 1 PID: 22020 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #88 [ 294.646466][T22020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.646470][T22020] Call Trace: [ 294.646486][T22020] dump_stack+0x172/0x1f0 [ 294.646497][T22020] ? string+0x208/0x230 [ 294.646516][T22020] print_address_description.cold+0x7c/0x20d [ 294.662070][T22020] ? string+0x208/0x230 [ 294.662082][T22020] ? string+0x208/0x230 [ 294.662096][T22020] kasan_report.cold+0x1b/0x40 [ 294.662110][T22020] ? string+0x208/0x230 [ 294.662128][T22020] __asan_report_load1_noabort+0x14/0x20 [ 294.672506][T22020] string+0x208/0x230 [ 294.672520][T22020] ? widen_string+0x2e0/0x2e0 [ 294.672534][T22020] ? console_unlock+0x68b/0xed0 [ 294.672551][T22020] ? find_held_lock+0x35/0x130 [ 294.744524][T22020] vsnprintf+0xbfc/0x1af0 [ 294.748863][T22020] ? pointer+0xa30/0xa30 [ 294.753101][T22020] ? string+0x1cc/0x230 [ 294.757261][T22020] add_uevent_var+0x14d/0x310 [ 294.761944][T22020] ? cleanup_uevent_env+0x50/0x50 [ 294.766971][T22020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.773226][T22020] ? input_dev_uevent+0x110/0x890 [ 294.778251][T22020] input_dev_uevent+0x163/0x890 [ 294.783098][T22020] ? input_add_uevent_bm_var+0x150/0x150 [ 294.789249][T22020] dev_uevent+0x312/0x580 [ 294.793574][T22020] ? device_get_devnode+0x2e0/0x2e0 [ 294.798785][T22020] ? kobject_uevent_env+0x2fb/0x1030 [ 294.804088][T22020] ? rcu_read_lock_sched_held+0x110/0x130 [ 294.809809][T22020] ? kobject_uevent_env+0x37d/0x1030 [ 294.815107][T22020] ? device_get_devnode+0x2e0/0x2e0 [ 294.820306][T22020] kobject_uevent_env+0x487/0x1030 [ 294.825411][T22020] ? release_nodes+0x548/0x9c0 [ 294.830188][T22020] kobject_uevent+0x20/0x26 [ 294.834686][T22020] kobject_put.cold+0x177/0x2ec [ 294.839545][T22020] ? evdev_handle_set_keycode_v2+0x140/0x140 [ 294.846389][T22020] put_device+0x20/0x30 [ 294.850540][T22020] evdev_free+0x51/0x70 [ 294.854698][T22020] device_release+0x7d/0x210 [ 294.859375][T22020] kobject_put.cold+0x28f/0x2ec [ 294.864225][T22020] cdev_default_release+0x41/0x50 [ 294.869245][T22020] kobject_put.cold+0x28f/0x2ec [ 294.874120][T22020] cdev_put.part.0+0x39/0x50 [ 294.878711][T22020] cdev_put+0x20/0x30 [ 294.882687][T22020] __fput+0x6df/0x8d0 [ 294.886681][T22020] ____fput+0x16/0x20 [ 294.890659][T22020] task_work_run+0x14a/0x1c0 [ 294.895279][T22020] exit_to_usermode_loop+0x273/0x2c0 [ 294.900566][T22020] do_syscall_64+0x52d/0x610 [ 294.905339][T22020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.911236][T22020] RIP: 0033:0x412b61 [ 294.915403][T22020] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 1a 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 294.935059][T22020] RSP: 002b:00007ffe7a90d320 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 294.944774][T22020] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000412b61 [ 294.952751][T22020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 294.960740][T22020] RBP: 0000000000000001 R08: 00000000920a9a26 R09: ffffffffffffffff [ 294.968707][T22020] R10: 00007ffe7a90d400 R11: 0000000000000293 R12: 000000000073c900 [ 294.976687][T22020] R13: 000000000073c900 R14: 0000000000047d9f R15: 000000000073bf0c [ 294.984665][T22020] [ 294.986987][T22020] Allocated by task 22021: [ 294.991404][T22020] save_stack+0x45/0xd0 [ 294.995573][T22020] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 295.001198][T22020] kasan_kmalloc+0x9/0x10 [ 295.005532][T22020] __kmalloc_track_caller+0x158/0x740 [ 295.010901][T22020] kstrndup+0x5f/0xf0 [ 295.014878][T22020] uinput_dev_setup+0x1d4/0x310 [ 295.019726][T22020] uinput_ioctl_handler.isra.0+0x12b8/0x1cc0 [ 295.025723][T22020] uinput_ioctl+0x4a/0x60 [ 295.030576][T22020] do_vfs_ioctl+0xd6e/0x1390 [ 295.035165][T22020] ksys_ioctl+0xab/0xd0 [ 295.039325][T22020] __x64_sys_ioctl+0x73/0xb0 [ 295.043911][T22020] do_syscall_64+0x103/0x610 [ 295.048582][T22020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.054459][T22020] [ 295.056865][T22020] Freed by task 22021: [ 295.060933][T22020] save_stack+0x45/0xd0 [ 295.065082][T22020] __kasan_slab_free+0x102/0x150 [ 295.070017][T22020] kasan_slab_free+0xe/0x10 [ 295.074515][T22020] kfree+0xcf/0x230 [ 295.078403][T22020] uinput_destroy_device+0xf8/0x250 [ 295.083698][T22020] uinput_ioctl_handler.isra.0+0x886/0x1cc0 [ 295.089586][T22020] uinput_ioctl+0x4a/0x60 [ 295.093927][T22020] do_vfs_ioctl+0xd6e/0x1390 [ 295.098526][T22020] ksys_ioctl+0xab/0xd0 [ 295.102680][T22020] __x64_sys_ioctl+0x73/0xb0 [ 295.107272][T22020] do_syscall_64+0x103/0x610 [ 295.111866][T22020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.117768][T22020] [ 295.120182][T22020] The buggy address belongs to the object at ffff8880a7c81700 [ 295.120182][T22020] which belongs to the cache kmalloc-32 of size 32 [ 295.134404][T22020] The buggy address is located 0 bytes inside of [ 295.134404][T22020] 32-byte region [ffff8880a7c81700, ffff8880a7c81720) [ 295.147405][T22020] The buggy address belongs to the page: [ 295.153032][T22020] page:ffffea00029f2040 count:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff8880a7c81fc1 [ 295.163170][T22020] flags: 0x1fffc0000000200(slab) [ 295.168224][T22020] raw: 01fffc0000000200 ffffea0002772048 ffffea00028351c8 ffff8880aa4001c0 [ 295.176853][T22020] raw: ffff8880a7c81fc1 ffff8880a7c81000 000000010000003f 0000000000000000 [ 295.185453][T22020] page dumped because: kasan: bad access detected [ 295.191854][T22020] [ 295.194201][T22020] Memory state around the buggy address: [ 295.199838][T22020] ffff8880a7c81600: 00 00 fc fc fc fc fc fc 05 fc fc fc fc fc fc fc [ 295.207909][T22020] ffff8880a7c81680: 00 fc fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 295.215967][T22020] >ffff8880a7c81700: fb fb fb fb fc fc fc fc 00 00 fc fc fc fc fc fc [ 295.224019][T22020] ^ [ 295.228080][T22020] ffff8880a7c81780: 00 01 fc fc fc fc fc fc 00 00 fc fc fc fc fc fc [ 295.236405][T22020] ffff8880a7c81800: 00 00 fc fc fc fc fc fc 06 fc fc fc fc fc fc fc [ 295.244456][T22020] ================================================================== [ 295.252506][T22020] Disabling lock debugging due to kernel taint [ 295.277348][T22020] Kernel panic - not syncing: panic_on_warn set ... [ 295.283980][T22020] CPU: 1 PID: 22020 Comm: syz-executor.2 Tainted: G B 5.1.0-rc6+ #88 [ 295.293347][T22020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.297192][ T3876] kobject: 'loop3' (000000001f997ab7): kobject_uevent_env [ 295.303745][T22020] Call Trace: [ 295.303766][T22020] dump_stack+0x172/0x1f0 [ 295.303791][T22020] panic+0x2cb/0x65c [ 295.322388][T22020] ? __warn_printk+0xf3/0xf3 [ 295.326989][T22020] ? string+0x208/0x230 [ 295.330751][ T3876] kobject: 'loop3' (000000001f997ab7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 295.331153][T22020] ? preempt_schedule+0x4b/0x60 [ 295.331172][T22020] ? ___preempt_schedule+0x16/0x18 [ 295.341778][ T3876] kobject: 'loop4' (00000000b1c81a71): kobject_uevent_env [ 295.346139][T22020] ? trace_hardirqs_on+0x5e/0x230 [ 295.346154][T22020] ? string+0x208/0x230 [ 295.346169][T22020] end_report+0x47/0x4f [ 295.351327][ T3876] kobject: 'loop4' (00000000b1c81a71): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 295.358361][T22020] ? string+0x208/0x230 [ 295.358372][T22020] kasan_report.cold+0xe/0x40 [ 295.358390][T22020] ? string+0x208/0x230 [ 295.363743][ T3876] kobject: 'loop1' (00000000ad402534): kobject_uevent_env [ 295.367530][T22020] __asan_report_load1_noabort+0x14/0x20 [ 295.367542][T22020] string+0x208/0x230 [ 295.367557][T22020] ? widen_string+0x2e0/0x2e0 [ 295.371741][ T3876] kobject: 'loop1' (00000000ad402534): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 295.381821][T22020] ? console_unlock+0x68b/0xed0 [ 295.381834][T22020] ? find_held_lock+0x35/0x130 [ 295.381845][T22020] vsnprintf+0xbfc/0x1af0 [ 295.381859][T22020] ? pointer+0xa30/0xa30 [ 295.444468][T22020] ? string+0x1cc/0x230 [ 295.448622][T22020] add_uevent_var+0x14d/0x310 [ 295.453383][T22020] ? cleanup_uevent_env+0x50/0x50 [ 295.458403][T22020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 295.464647][T22020] ? input_dev_uevent+0x110/0x890 [ 295.469754][T22020] input_dev_uevent+0x163/0x890 [ 295.474603][T22020] ? input_add_uevent_bm_var+0x150/0x150 [ 295.480229][T22020] dev_uevent+0x312/0x580 [ 295.484550][T22020] ? device_get_devnode+0x2e0/0x2e0 [ 295.489742][T22020] ? kobject_uevent_env+0x2fb/0x1030 [ 295.495024][T22020] ? rcu_read_lock_sched_held+0x110/0x130 [ 295.501281][T22020] ? kobject_uevent_env+0x37d/0x1030 [ 295.506559][T22020] ? device_get_devnode+0x2e0/0x2e0 [ 295.511754][T22020] kobject_uevent_env+0x487/0x1030 [ 295.516873][T22020] ? release_nodes+0x548/0x9c0 [ 295.521633][T22020] kobject_uevent+0x20/0x26 [ 295.526136][T22020] kobject_put.cold+0x177/0x2ec [ 295.530981][T22020] ? evdev_handle_set_keycode_v2+0x140/0x140 [ 295.537389][T22020] put_device+0x20/0x30 [ 295.541536][T22020] evdev_free+0x51/0x70 [ 295.545688][T22020] device_release+0x7d/0x210 [ 295.550273][T22020] kobject_put.cold+0x28f/0x2ec [ 295.555120][T22020] cdev_default_release+0x41/0x50 [ 295.560139][T22020] kobject_put.cold+0x28f/0x2ec [ 295.564994][T22020] cdev_put.part.0+0x39/0x50 [ 295.569606][T22020] cdev_put+0x20/0x30 [ 295.573580][T22020] __fput+0x6df/0x8d0 [ 295.577559][T22020] ____fput+0x16/0x20 [ 295.581555][T22020] task_work_run+0x14a/0x1c0 [ 295.586227][T22020] exit_to_usermode_loop+0x273/0x2c0 [ 295.591691][T22020] do_syscall_64+0x52d/0x610 [ 295.596279][T22020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.602180][T22020] RIP: 0033:0x412b61 [ 295.606331][T22020] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 1a 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 295.625927][T22020] RSP: 002b:00007ffe7a90d320 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 295.634507][T22020] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 0000000000412b61 [ 295.642498][T22020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 295.650603][T22020] RBP: 0000000000000001 R08: 00000000920a9a26 R09: ffffffffffffffff [ 295.658698][T22020] R10: 00007ffe7a90d400 R11: 0000000000000293 R12: 000000000073c900 [ 295.666679][T22020] R13: 000000000073c900 R14: 0000000000047d9f R15: 000000000073bf0c [ 295.676277][T22020] Kernel Offset: disabled [ 295.680614][T22020] Rebooting in 86400 seconds..