ts}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x48, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f00000000c0)=0x7fff) [ 109.346995][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.355796][ T7707] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.363055][ T7707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.389176][ T7713] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.401189][ T7713] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.410154][ T7713] device bridge_slave_1 entered promiscuous mode [ 109.438119][ T7710] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.449279][ T7710] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 109.461533][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.470046][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 109.479427][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.489109][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.498426][ T3485] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.505804][ T3485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.516374][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.525330][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 109.533992][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.542981][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.551541][ T3485] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.558682][ T3485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.567035][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 109.576226][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:51:36 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff3c, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 109.585809][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.595283][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.604531][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 109.624809][ T7706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.657148][ T7713] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 109.680762][ T7713] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:51:36 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x100000000, 0x4, 0xfffffffffffffffe, 0x0, 0xfec6, 0x7a10aa1e, 0x9, 0x3, 0x7, 0x0, 0x7fffffff}, 0xb) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40605414, &(0x7f000001cfb0)) [ 109.708739][ T7710] team0: Port device team_slave_0 added [ 109.731932][ T7713] team0: Port device team_slave_0 added [ 109.763228][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 109.773039][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 109.782228][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.790946][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.799752][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.808973][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.817350][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.825916][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.842069][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 109.851394][ T7710] team0: Port device team_slave_1 added [ 109.861390][ T7706] 8021q: adding VLAN 0 to HW filter on device team0 [ 109.869778][ T7713] team0: Port device team_slave_1 added [ 109.877866][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 109.886136][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 109.895475][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 109.903835][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.912376][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.920991][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.929417][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.941129][ T7703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 109.953037][ T7703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:51:36 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180), 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x1a6}], 0x1}, 0x0) mount(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000028c0)={0x1, 0x0, 0x2080, {0x10000, 0x10000, 0x2}, [], "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", "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"}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x0, 0x7ffff) r2 = mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) r3 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$input_event(r3, 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) r4 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000c80)={0x80000001, 0x1, 0x4, 'queue0\x00', 0x2}) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f00000001c0)={0x5ed}) write$binfmt_aout(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="0000fcffe6000000c70000000000000066000000000000000000000000000000cb70aae78ad9fa8c346f32ee02ef292715fa5fb73ab92d32795594c426e7ab97eefdecbdf11f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008819d73abeedb937b78eeba334d604f7ae"], 0x957) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1105511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0x0, 0x8, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], [], [], 0x0, 0x0, 0x0, 0x0, "dfdefeeabb8b847f70a9f7faa4dddcee"}) [ 109.989533][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.000861][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 08:51:36 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180), 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x1a6}], 0x1}, 0x0) mount(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000028c0)={0x1, 0x0, 0x2080, {0x10000, 0x10000, 0x2}, [], "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", "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"}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x0, 0x7ffff) r2 = mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) r3 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$input_event(r3, 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) r4 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000c80)={0x80000001, 0x1, 0x4, 'queue0\x00', 0x2}) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f00000001c0)={0x5ed}) write$binfmt_aout(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="0000fcffe6000000c70000000000000066000000000000000000000000000000cb70aae78ad9fa8c346f32ee02ef292715fa5fb73ab92d32795594c426e7ab97eefdecbdf11f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008819d73abeedb937b78eeba334d604f7ae"], 0x957) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1105511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0x0, 0x8, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], [], [], 0x0, 0x0, 0x0, 0x0, "dfdefeeabb8b847f70a9f7faa4dddcee"}) [ 110.097173][ T7710] device hsr_slave_0 entered promiscuous mode [ 110.104355][ T7737] proc: Unknown parameter 'í' 08:51:36 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180), 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x1a6}], 0x1}, 0x0) mount(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000028c0)={0x1, 0x0, 0x2080, {0x10000, 0x10000, 0x2}, [], "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", "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"}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x0, 0x7ffff) r2 = mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) r3 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$input_event(r3, 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) r4 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000c80)={0x80000001, 0x1, 0x4, 'queue0\x00', 0x2}) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f00000001c0)={0x5ed}) write$binfmt_aout(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="0000fcffe6000000c70000000000000066000000000000000000000000000000cb70aae78ad9fa8c346f32ee02ef292715fa5fb73ab92d32795594c426e7ab97eefdecbdf11f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008819d73abeedb937b78eeba334d604f7ae"], 0x957) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1105511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0x0, 0x8, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], [], [], 0x0, 0x0, 0x0, 0x0, "dfdefeeabb8b847f70a9f7faa4dddcee"}) [ 110.140505][ T7710] device hsr_slave_1 entered promiscuous mode [ 110.230331][ C1] hrtimer: interrupt took 34741 ns 08:51:37 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180), 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x1a6}], 0x1}, 0x0) mount(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000028c0)={0x1, 0x0, 0x2080, {0x10000, 0x10000, 0x2}, [], "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", "c13c1486fcb101ef5cbd4afaa785a1379853aec1f4e7c00cf1f15a9b9d661ec2c8c5e6ff21f0fd3b113670e095ecfc3660639521b410a9ce2fb5401843c63263676400068648ace22f972e52336d0d92aac307ca2a6d1e257551a67585c1ef0411cdecb0523e1afbae81154b28d70fe49ba466cc20d9d77d6ce657530f2a3704a0f7ab282517c7bb1d7adb932859eb057ba294559e7a0c3f13a8535421808f14dbf042da97b1381934e847e9c93157a443afc2f1776392905e2b2936329127917aa5870cd0ae998fdae1107cf4d036a8aacc4ca870075ef0469985469d7ee769410bbdcde2df0a259539589e1635a78637f2212afaecdc9f86974507e9aacf1dac2646c50fd1c4d084dbd8f7c76d48bcd68dff78d996d355ec4faab7245b5daee36c399ee0b3e00dfa64ac795f241d475bb1419ef8eec699eecb3935865a664e26a3e16393023ef624271d33c34ee02fd00daeecd9c4e0056d1200f53a8578c8c3e2e0c8d237994ad814bbd0d39476fd69014275beceeb4f4ca49d5e1d62597b8c7f6d1b1eb81aca767022549070fd17d8dd785439e8bcb4d72eaab1cfae07a7000fdb666305bbed9b57c96d08f776cad25f3927dc2a224a785e09d2ad10592e343fc518dae860e9aaa8c55fee6194c0b838fd586c35f34b480649987500b4a552d3300cb33dd4e043380c9edd6ebaaba08be460c2468cd5c3fe3908a9e3fb3be3e5b2bf02bc65e87239b9ad7f87120c2ab14ea448da6d2f5bc39845cd1568838901e81f0b4c27e545c30d21caddc922170864e2936798268e6d9d78860f9517f6a70585e26f35acb0e916587205c746ee88885301ad901b33f8f711caa70ea16ce593aa9edbb33dc2b70da87adbbd111b72a3d5af93438a3b32b05937f2563fc34f016465bb0afd86bd84324b1a99bade21a0222bc886497fb789661bc3d3657bd8e3fe9de5cbec4c0681de1edd40b16b08da06d4812b313f42cc4f2ef7fc8898be108b65f625d1cb8ea931a9bcf4f5d29a0be5f1b166cdcf02fbd489266534b76360226f33f110c5239972f161063047e628ce86c07ce789968c2e1f6c83969be2667c12fb60c0be0be7033a00883feba5d62922954dc3139b70eb3ea7198db2b2bd1f52e16a48106c3f8d1603bd134fd5aa5827693d6d7eca09aaa0b2460a2ed4d647c19d8d2e5fe70bb4ad2d95cd0918d1ff71bf0fbb43f5f0ff034223746c344d9825c57d15f60befbe7e1263e52f6b5d6c417131a08c6d6f3103d88aa07d551084898fa03deee7ac0f7d5439b2f005eefa522b54f9c9bff20b8db268c05ec08534246abfab719dea4db4fbf2a37229c5bdc37dea38fe4cfbbb6497a604944cd0ad3d6dcc0346fa12a0e4a5f5658ada33ce5a5146727569edc7940337807440b62a9e0c7bdc3ef2578b44863e3d1130b89a0b2ce8c83f70d46921f809073f234d8cd442ae183e53049425953755f5d40942a63445d91fc8dd9513932ebc7eb0beb111837ff86bd8fb5f4cd267d1c6af0a2a54462db24e5a04b58dcba90fe680e25e96fb4a80a58b69e6195a5de6961335998e4e73512c99efb597a96979b2bbd8d4bcd6a781f5fda37087154f4d25bbd9957392f5d9d88f50bcd4e796ede6178a69b9685776639a8e3a0fcdfaa1a9e237a4ec21b62faa8c60321e136b3059f68ad16987d705e3df17641154f85748e71386e2b585f2a368aeb4f4c39d5e8905d4649877bbadf00cf5769621a9c1773722804081f80736f65349923ae4b8b58b3e988a654fcc2ffa9c38e12dbd16a21562e2f22455fa93c858724e18ecb916f42f557fd61834cfc04ef34761aa750f192a210eff74ed5a0ba3338c211ecf1406606e38cc051167c9f98652088801578996af6277504efa67ad8486b2071f3426d17a5e4557f3d6e8ccf51694fbf1f60f4f681f12e2d41731b988539cf0f9c8fc904794ee0f315c149c2ab520e8541f89e5fb6a099abb1d65e8e117a0a301ffe3da2c77dddb0545181c67c092fbe6c39170b1d2f6d5d6416d452fec55d729767f2af9427a501616b6410d60b4e075482af5fc9078431bfbd4de1aa734c9648c957f384c60ca7cfd93272dc758a8ccc9e67215d6ca17471a5f3ef84e21c2271788bcab10e1bee7efe206d19ecbecd5bda38591c4df5e188c220529ea4aed1cd72749874cb2d0c7977e150d6d41bc5ee3dcb2f2d36a0f1781ca7bb28aed663ec1dfc6688eda03bae76dab87d98286a8aa47d5bbc07f3e7b7b54908e898a89fc410db434bbde548f4152f3f10bc4f01850edc1dca6470e9663ab51edee209b3a14449b24abcd2a21281cc6de1e8af2e6ced13f377cdac72efa3aaab0bde3dc6605dd3af67ee901069318c535b47f7169b00a0e2e72a490295f49ceaa326aa2e266a6ef06ac1d777a61aa545e894a3b6e3dab18b848b6cb7daf066bd8b6c92e933021feb2d338fa38189e446530f682ef1f652bf3cb4139a30c4e50fb155d468fe3544f2b7d2d407be1a9994dc549c26b094f2ca9cdc61069734f1524e509fb46cb4874ef189ce441f7a487167ee2a23603eaad2c3cd2a4743046320ad00aa04564b7404b6a8e180023764012d434afdd76e46007e986e239b13bb73ec2bd3a3c33e8e05f200f4b6e75178d72bc47a02b12a3efa65911d8e85799c4420af77d060d7f4241b3be7bdd56b29e984f9995ab543e65a9231fba852dcb4f53003c5906ed2f40780382ec2ff8f4c0fcb846e534f09b8d9c6ecf38fc6d419c4be7bb9fa69081846c74c99766112c3fe53f2e5b98f1b60f0e198ff28fac1a33a7fb7a44046bcdf3ada657e828924c3021f99e1d4e1c161c69bb6df3179e00805c05d4f782d3fa91a2d0a6467ebb28b5108d10430a2054062222520381e826d886a29d7338eb33496f231edc271fb55d75d9c67e4470c14405675bb7e016d5be2e4a47472ecc8323f98c064fa1075773f96279d6692cd6cc161582d5325f626f8f33965bc665328f70e8a76dd21cb70d550aaf93f8dfb97aa43f7e27d8907a4078bda96477535b2a3c5929d970666da63283c75560e2c07215acc2d5fda7d2652985b5d7568a1ba6f48427daa2f3d95228d587e4044ec2ea01f742fd678488824a8642432642a4d0497ac35e794e6132a70fd8d4ef93515e2ab38260fb11631a2d05da686fdc8ddabadb43b11bab73f95131ee6113d5aa046f886d85e2623cfcee05d605222b560c9a52bd748730633635dc763da88ce128034761d0a6c88ad3e87b2ff2aab0105bb24099cd642c3c8562d1de0cb0e403eb9125ef9c8c2d8b8d133e0759af656f73173d6194cf7e5b3bef24cc376793f776ee3bc6a95bf058538857a908babe7b02494356fdb7dcf9af35d8f602641592db5d36f810e12232dcf25f05f55e4054a8924024c01f7c1791be5a5fe067620088660ffd9e09b79977773d230cb918230bdca4c4c2f974e8e5395d34934e3beb22907a66618bdeaa1715e610c318ed2e220a1042b0737e11fb3e92276e55ca324b295a53acb61312a33d9e8ddee16ed69211e92f60b6aeaffb69c69a85bdae4237feda96c9dee6fac6fa8e8bf44e42162308f2749c7dd62339b434ea0af6beb9f37b698ab9e2c8ccaf1ef17b1dce29104e9dcddfc7e1d307701216d6c8e461bf1e744233297a7f5fe381dc15e2787dd7b192e80d182ed85eac87b25c5576c582d82f85317933d0feb740c31c4f0a612599469482446584a569e1999ab3290fc49d249c47d8e5deb48052d34b2fed985e01ff7b131f30967fa7b5b8de4a6520855910eef804d6f43b46dc06a28eacea85fa156d5e9fa6602a92daf0148d3890e439215f7af7225be47719d0b8fbf881cb5b0a37e8387e42eb0021c47909a3d167d36289381a41eebe89b9e8f69fc1b1f46fa45333c41223b9442604f4eec1a1e1ec3ed3be2d078913d9811f9ef110d85536bb25b439bcb739239c81728f43112d181a4af0dc2006586ebff778104d9b8e026e3ec8040743fb74bef6c56ab11f883b021f2ddad945ed3575ec7f45a5723b7afab7f44ed4ed79b1156f3e29b82281473aff6eef7a6bd44db15db87f81cdd21c2aecf9b9a997073394b701c4dbec8a29e0a764280df0578ee4118c45633a6a77debe69ab042163175130dffc14f183ef26ee179f4dbc2493e6bc118eb0d5949c977183c78231302a6ba83d0a22a3617335db17b98ffeb3b3ea83f9ce4cb4922d7d775c31d31c0b195010d21c108a5d28910348ca5bb01edd6027b9d84af77af91486495897597f7de418c85e01c2395b7ea2f23d7bac9b31824a11ae06e4adbd900396b8a1f06e4d36b6b2ec2dfbfae5b122873f1766ce4f0aac448a7d713337285dfb635b32029600e665cdda80e6b85dc2ea7f171ae639134cd5a7d987b29924327fe488894157fb10723cf4e8a93a549180d235cfb3733fa1648c6bce46893aaf9cecc59ea489819c68ae3d3ac04e86b5a6db82764625250fd4cfeeec3a27f6bf6f46fc146069a5bad970a72359deba11e7e32b6405e4f467125779eca215d734064677ac68ac454312885432adc321c9ebb69881e970ee87f8486b473ca808b7207d3d3567944c843723de1052b7cac450410f889c5dec9c3fbfb56e8c5ca4a4237861da58d3963e711ff8cf518ae80c8a204dd29f5b8386a6754986bd4fc9dc41989da63f762296d84a3eea1ecf1c0afab9138567881eeeb1aa6df856051d995b05810267f01384b6e85ce44595c161773d5119bbbb7ff785267ecfef8b0c9187fda3d15f0d3e073a9649ba74f16de35f876d9c62c2769a028315491e656008ca3c896ff350f4b231a79d99e660d42a8bbdf21e0c6380faacb549cc3d2f8d4fb9ad1f7dea051bea7a85ef76283c47249a488be949d65624007fe2e39d5396ae5fbcd1a5161b533290ca7afb33dd15462381b14bf91a09fdc29455274fd8b01b82944d9fb57d27ef4cd334f5711d506de02d6d95c34ca6d8ca9a5d4888307633705463729fee8ecb9853b1385eb24bbc437134866d3f90a8cc21f58d6ce9fc6bd40d527dfc0a04c191c818aafaf22ae096d096515929f91b6524fed1189b47793cced51f9fb898f00bc235ca21e8096564b6b6a0e0c717cd5c00dfd6de591c0ab90f96d097a0d4475687e8b82a6d2dfece02aa3e02e1574fb5407bf67805f5039b0177dce9987928862f7e102fcf87e747e1a358befdfc393cae19d1d00fbdcf8de6eff5b50d4ae5c7873630849af278ced0c805b7fe51f191530da10f4c6ec70823d2cd4045e6c961f4678c1df2e41680948b841856bdb8bffc99c0856e8cb232e92056d47bb671acffcf1675d58d57f6050a93c5da8dfcbe3ac06e1d68ddbfb4dc42cdfe68067f4971beb62742415e179cb969579356a0231240534e36e65102ba1d9d32b382a3302154a2518db3e7216d8f3cedea92fc09fc10555203aa4b5dd406fee6a6ae303e43345088e26097ba4b56727c8b54d7b0c031c127c58d2cdec6900e74760689ec55cf3160c665a72b06e1352b1a277bbc9f0da507f34a6f976ca9e9b52477309af42b99c5950fefbdaf87df6407872bd3f427d5154c69e2edc9e40b49d181b22198935e679171350cde00abb03405d00c455625bc912b797571a12713f5058b87db0d81937d30ce4e76bf348fb7dfe94c763d86f17dfaaf530a037ed40d08ee5f5d9580205998186f25072cba55756327f5cb0c46022547051583f599e1c40782adb1e8ab648c770840c68ba4558d06ff2b545b0abdf0a01ae841cf84abc5e66a9d0d7431647c0ad3b40616b83cb044378548"}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x0, 0x7ffff) r2 = mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) r3 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$input_event(r3, 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) r4 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000c80)={0x80000001, 0x1, 0x4, 'queue0\x00', 0x2}) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f00000001c0)={0x5ed}) write$binfmt_aout(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="0000fcffe6000000c70000000000000066000000000000000000000000000000cb70aae78ad9fa8c346f32ee02ef292715fa5fb73ab92d32795594c426e7ab97eefdecbdf11f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008819d73abeedb937b78eeba334d604f7ae"], 0x957) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1105511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0x0, 0x8, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], [], [], 0x0, 0x0, 0x0, 0x0, "dfdefeeabb8b847f70a9f7faa4dddcee"}) [ 110.256372][ T7713] device hsr_slave_0 entered promiscuous mode [ 110.304738][ T7713] device hsr_slave_1 entered promiscuous mode [ 110.365427][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 110.375283][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 110.385831][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.393067][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 110.410817][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 110.420532][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 110.429326][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.436441][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 110.444411][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 110.453476][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 110.462889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 110.472526][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 110.482064][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 110.491758][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 110.529162][ T7703] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.548436][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 110.557906][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 110.591868][ T7706] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 110.605504][ T7706] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 110.642417][ T7701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 110.659382][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 110.668822][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 110.685607][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 110.697108][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 110.729692][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 110.769505][ T7706] 8021q: adding VLAN 0 to HW filter on device batadv0 08:51:37 executing program 1: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) ustat(0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) ustat(0x0, &(0x7f00000000c0)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x480800, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) getgroups(0x6, &(0x7f0000000140)=[0xee00, 0xee01, 0xee00, 0xee00, 0x0, 0x0]) write$P9_RGETATTR(r1, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x22, {0x22, 0x4}, 0x10, r2, r3, 0x1, 0xfffffffffffffffe, 0x8, 0x7, 0x0, 0x10001, 0x4, 0x0, 0x0, 0x400, 0x2, 0x8, 0x7, 0x9ec3, 0x7fff}}, 0xa0) 08:51:37 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180), 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="7027244a93b90a1de7bfc1ed0e95876df0d074347d046d60f44959b7fdfcd5e61a703636c5ebe0773ad10ea9bc3018566824463898e81aad5629e71e5d30f2b5b68d8a497d8f19d491f51d8585f2e0eeed54220fbe69d7d01491f2edd5c5cfc90c22d5e048fcdab7e8e413dc479c7bf4b4fc86e17013aca658aade625505ebc392cac63082c42cbcd02827e2a0ad26f559ef4c1cfb60a8ee9c9b5412935bc290d54f34c4d04e06839006ac9ce34c1738b9951ffae2fa452b08d3d7e1803a1c868489e5a63f710937692c7ee58f334cccd05805c5cef9103dcd01e4ffd34e389b26498318c74651b5b86b3af64e16545f85235d33e171b4112479ede24d83d1f161b933d261eefca2c28faa27b7911f1bb07e0b836aa5253aa1a8cef07170f3f750fd807f3dcf176f31d902f17f688490364d596f2623499e2221a9f81a7a9ddd3062f7ca1055ea8b555e8b1a9272e977ce051d77cbf9c89625b1981becba833adaedc1328b3c2a8071078ec5c04467e9cca168fa01937e7f568fae5cdff21bba6fb056434b04d9c3ce5e59d84983e8a7dab117c376d3e7de357d456fc172f2f5b189afd8a522", 0x1a6}], 0x1}, 0x0) mount(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000028c0)={0x1, 0x0, 0x2080, {0x10000, 0x10000, 0x2}, [], "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", "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"}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x0, 0x7ffff) r2 = mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) r3 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$input_event(r3, 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) r4 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000c80)={0x80000001, 0x1, 0x4, 'queue0\x00', 0x2}) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f00000001c0)={0x5ed}) write$binfmt_aout(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="0000fcffe6000000c70000000000000066000000000000000000000000000000cb70aae78ad9fa8c346f32ee02ef292715fa5fb73ab92d32795594c426e7ab97eefdecbdf11f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008819d73abeedb937b78eeba334d604f7ae"], 0x957) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1105511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0x0, 0x8, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], [], [], 0x0, 0x0, 0x0, 0x0, "dfdefeeabb8b847f70a9f7faa4dddcee"}) [ 110.822721][ T7713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.835499][ T7710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 110.851449][ T7713] 8021q: adding VLAN 0 to HW filter on device team0 08:51:37 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) read(r0, &(0x7f0000000000)=""/135, 0x87) [ 110.920845][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 110.950826][ T2876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 110.999400][ T7710] 8021q: adding VLAN 0 to HW filter on device team0 [ 111.025882][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.040786][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.050232][ T3485] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.057421][ T3485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.074749][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.083613][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.093789][ T3485] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.101074][ T3485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.109584][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.117486][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.126086][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.143651][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.153021][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.162756][ T3485] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.169888][ T3485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.178051][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.187263][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.195970][ T3485] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.203131][ T3485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.212234][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.254878][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.262950][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 111.295106][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.309775][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.334943][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.343404][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.364947][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.373554][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.399440][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.416755][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.425004][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.433534][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 111.442175][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 111.450816][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 111.459462][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 111.470890][ T7710] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.483312][ T7710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.495384][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 111.503303][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.513010][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.521551][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.531497][ T7707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.555721][ T7710] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 111.567932][ T7713] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 111.583517][ T7713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 111.598263][ T7711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.607735][ T7711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.634847][ T7713] 8021q: adding VLAN 0 to HW filter on device batadv0 08:51:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xfffffffffffffffe, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000140)={0x9, 0x143a6000000, 0x1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) chown(&(0x7f00000002c0)='./file0\x00', r1, r2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x20000, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x5, 0x12) bind$alg(r3, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) 08:51:38 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl$PPPIOCNEWUNIT(r0, 0x40044102, 0x0) 08:51:38 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xbfffffffffffe, 0x40000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551c, 0x0) 08:51:38 executing program 0: socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180), 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x1a6}], 0x1}, 0x0) mount(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000028c0)={0x1, 0x0, 0x2080, {0x10000, 0x10000, 0x2}, [], "546e78053b8f4e4184636447df17c17c9598e4caf137c3cc65bb9a792a75b8c4094b66908d43ce199531d71e07eab2efa3acf15330db5b17d6c031e59a937dcedf470609e0528ce4bf6348b87041824b13ec474eccef8d1c5e5e8c66c4659e6aee387d191d3c93e67ac63d0d99be3f8b071656ac0bd83ee7545cfcdeec981323d92a1b12e976f7fe70b9acff03341d032bac933419a09f26b2467ffcb488a7b5f6d4c76a0d20b63e1130c04d4152401da73fb0a8445916932f23943bd5e58176066ee3c9d9f7544c6c1d1845e58ca678481f0ad4687ce39305bb67d3bf062d944b410beb8eeeb69e92f5113761281509a83018f4ef172974c52264c6982b653d249c2f8a65ec561ff9ed281e218f9b3783067839af333fed728e22d0f4e7c8ba41c34f4749e6914cfcaa13130c84cebe32ec7e6b7c472d3fa53fb4957c5e3533d1e6fabd733a1420127bc6bd63ca9b73a999282910b9f75f8e26fc64c778e81854c002626d88882f487a6697f882ff1f80bfccd39d4bddf77e04df3527d0b6b0c810126fab0e0d86fd9f481b07397beac514e6ad242bb6da02300adad933141abaf25feef7b56b035bb95a0b1eed26b5ebd6f266d945dac7f6f064b4e9c851b84ab015b46d92b56f9c35ae659d84578d7e351eadfe07c6f80bef65c73992253ce9229b713b18479b989f84d3b28bc2c8203690be88c9fb147fca119af2324cfcd485a93784d94900ecb1f3ac4b2e2a50bddc44093d9ffd79e3237e4282ec755b33c8e8f98470739e8f442131ebe455f974b7cb9a5568285a0d8ab1e4c30023cdf47ec774c7eb0d8c3a756a7dcfefd6c863aaacab1126fbea21e0c9433f59efefe1219f63b85efa7cc2f26ddc7c88f47eb0388bf39a3155edebe2f4910cb046086ae75059176c6572285623e61fd9c0595dba63434b0626e4462e85e2af85075a32cc1dc700b110753d4be97a1b5b7f280601412cdd85d1ca62e81f1e70bc5715ee69ef10a36d2b558d33fdfe72285458cfa15c208dac7a09cb98139afdb0a730b89a480824f60637b2b8ef68fc569550e97d56b411da3ef9e1189c395c5940b89ce8a09dde3f070d45401853ed3350f33c842eee919a6c792381ecc991cca430bea1a61d0191ec6a96fb6864cf2864be7b3e9c507667047959f717e1381978a03b7fa35a880b07ba501ec2130dd809cbfe0c72b78cf05fd2af9f3b02a9352cfb65933512986845f5d849feebd3da9173f6595b4e97f84b6d0ae4c362c3444335410080d4da2b7d5298fff60015da6f78f5e953cca144ac0bb2ddeb9f45550d92405778d77d5f27385f0debe9ac4af8b1f35af52d80f7109e9b39afb0f30474d3e80964aeb565b51a45c97f18a170dbd8d5ba3c8d5b8065aa596d6824ce29d91d68e111082e9a3277a813b41bd4789b6d459e476d33dad00867bc92c89c10705042496b4e697dde9ab23b23ba26830e2b8f8f4f79e2b806fdfdaaf5011b3eeb9aa351399b80460909aed1e6894de95a2266dc4ea525c78af759fcc2a2f6f4644ee017afd769be029d18decac96cfae199d7cb3d2c238420878561b9b44659d5dd51a744f790d5f04c83a34b8631d485ead8a99d72b296e22819578c81d74836c43bde53e0bf0a96dbb12c16af46183eb7ed0d9ad63d02868adc4ae3b90039a864f7bc5e1ab7aed1e6801c5abb8f1c1d713ced0389fd794a481829512b429c3adad292bead8b7b74d39109162b39e782240c74fdfee00a53a0fc395a8bc9e77946bf251353f9c1f38e007d5388fe8e8336d8cc255c0f557e78a62ef563a0dcd3cd396265471f434f0d535037ae241c387752847548d33b474082d25a94767d99fc947e9ff2e60e0d9431fba8672a7097ba3bff71c647fa4fd4a1c26ce43af51a12bdafe4729b2bfe3caf4864bef88c454ecb36ccc0b1a7b8e4b5b5172723acb37d8277691b6b2b9165c89db4a6e7964c11627f95d691fd4f14cd706cdd53d505448c7ec79e039e00792481bb5ba93c06b203d72fca47c483f0d2c90d4ec8bfb97937916823e144bdd7a99e5df0920a04a6706a74ea0b17818185bb1f04f0bc17820571ff9bf2426e239217142405d41030342ee156a5d7e87eb8556bd9707c1dc4248d48d82a5e5cec9ff239706639606e2f12f1b598a5cca56bec1d98dd0b21c38e50a3a2bc368dde869217a2ae988dc7282f90e63f2fe2eb4703002ab398ef2181b6332bae88558c0901eafb0452556eb6d10bfb724cb8670199207791048d009c4c07a0607a72f8e856dd405cd5635fb1041d184d6b3466f9421001cf69dc88973785363e90416b20d96f3dab32d8420dd1f04cd472298f10bd9fd0e5d331ef629b1b161c9a06fde6b4fabac6adf86b21da23ec668e965975e624b1500e8ae6c9b3af98894a619cce9d937948a959904574bd8ba801cb43396253a34a67e7564eb56105c0fb630424d14250d876a7f02ca2e4b131d46b887a1e98ec6c3c984b0e870ea1603bb299aace04b1f1ae340bd2bf6386dbb0e9393683ac39a90f9d572b8e2da9646a8c4cc2c6a7acb4fb7c5db191d9a11c077ea507d7bd5a3fe8726059e6dc1c61b30373f45d2f3a1236bcfb957eb51335022852c5648db3e37d981593ca2505bc65dab9e455211e06143a65cdc1a916f5dff31927deba7d1c30a39dc2174c3c5b9c7987b731f0341d08e02e0c0c7f587185d1c33d7a6de6bb442e6dc1acc3d75ae2075a8ab824ca417d8d6cefd46263116c6fa8c0529834afe0bfb51b064dbf1864ca46a1d9a51c3d955c561d9574613f412f1651e5c4b626fc26db07af8f29b6396794e0ed093a3a96794ad6e48bf2020f0f317491ae9526ddba336ff340e850314d8f0a3579412873ee9c233e525665e42b8562b81ccc71ab286b9d3ae345cb998792d793733e44aeb60ec19f7838c1e5eb1208e1ca9869cc7e82cfb02ccbe48b2a10bc1cfbc32e4f18a68e3b3c82f34a32bbc85f379fb630fbe189de57df7192eec845ffd4f4ed43ecc8288580beab880b45a501eeff2a27d8c9b57164654c83bd79ac3f816916a9f7cbcc52fd8b6c3d88c18ab75ca4cc0d2962e53f382ee0c712dbc52876723810b2e53fcda83623134908f3aa30b6cece7d2ab9f675c3de846557ff9d92f50a133f71ba381e9a2a4ccac488b2db75851a1df38da2ccb2f181ac4ff0c12370e8ff3f34adf8fc649bdfc9775180beee0d6b86dbe6f1faa88d090df5e66f4b74431e49dc0e93dfa676e68ac2762ee7c950b359b84fd3d6dba1c681fa22f5326575ca3c6edf5bc68b4697dcc0f52a37bea52c0404c323a4393424e910e34b32a20e10bcaa24b4615da04f13a42f54086800c79b272e9ddc9dbda6e3dd89cd11294dea3ccda1ec65328f5acb244bf1387d038a9a1756562fe42837d5cd0b4daea2faa785895a8f12806ccb28c5506999c051890951b2a96f5f3f6fb17d1eb9f16fda8909bfe09a526d30091ad83f52dc59f0d12646b064d2649bfdcd2e5e15c936cb09344beb620d6ba2d19d8c36b91baf25adb0018806747a37a4d382f579e6f97d664929000dfb3d38c245eaca5da7deb4176d00e171d05746a33a5330764aff6b9bd875b048550c15fcb1cd487fa4fb5502d464e25c52f80b412c2c9c1c4a255ead09774ec334161dd0ddd2e0e7ac59629ca6431d6f847dc5ae2bbdaefe6572541e76dae84f15a74843565ea191e05880c9442c9d659cb18feddf1ddaa89631dbef64be6581f44182e92b4695a69982d47656d908853130cb17eca3b8bf307d2bb9985cb7cf8ef0c91449ddafd6e5176f7829553a865bf60b96dce5e14c2dc8106a30988cee2b62a9712a7add5659a8a0d56b929d3879c3001ed25fd71447c99ddc9a4fcc31227eeda64372304c14f35da3d2eabc50c85aee5f4a4acbb72231591d797d548592e0b8c0655e39521db306a7c82e68383bdc054a9d0a1340cfe0ee66fdaccd89a7f36a90ac2dfe602c19cee9c5926c260c33907b54b06bdb74ae0e94738e9d01f67d44d605b5de7791d03f7ba0971a1a752697c920cd9403579458a1d0533c19d3205c8e267c3d6ded73dddbfa5dcce3f8a3b056393cceec062377caa552bf7d0c139819af564bc172e7e435a7b3923c5c960803e44d3cc70c0e4d10e43535ce1078c8a7d7e2cef07dd5a930be5b805c08c215b3242d29e179f4282c224e099ce4fb461f3b0b3aeab42d90ab925e36698ce9098d4eb447ef7fa693dca30d7f026a091ecc431e5110914a5337f4f0a5fb154bb5c2744fc0deef0e9be32d2c79cfd0342517259bb3657774ba636e2b26c3e5d1506a3d84182bc1f73d0f66a9c9baa66be51f22dd5def9abfb215adad11a0ed42f137be0a43c897f7220334b1f47a91ae042e078a6a868a9a5cbf96fc95127c2e211858fb2ec5710f3789a5a1a41558aee9dcb4ea2a3be10bacc6a1b1c40c7019c397e257f2886c590eb651aba621ef0e9f622482bb72e75b264b2e88ae11751754c4464c7396e6d194eeadf677c6527967e5d6c435e8216eabf35401a5b94bd627f46486e13462d2f41f0aa6ab950351066b12c5bf0a39f9be6c58c0b3a64d73e9253c15b4d11b901cf46af8e02aaa0fd334d3e35ae171531ce9b6ab92b13336200b6ffbdd818dbd04eb94abc033ecdf5fffa02325a6f65e86c43867b3d5c5dccb01fc06e7e12e88deeafcfb1951268e437ae41bda71d461cda8a204e1427ea78ab87ffaf1a4b9379c4c6479de341edae934aaee5758bbf59bf5edf101bcd4800e4f78d3418db7e4b7d53ceb8227f335ef8677924d4c7977b6ffb80ddae0f15df887e6c72bfa1cd072a9726f3a6c00dbaa6fc4e0b81fa13b42d448bdd1b2558089f4138f5d3020f6f09adacc8aa58fbaee5a7a24c40567264d3585c710edecea4387b36ac78c7d79107b47911b78daa8654e70a2f3cea740aeef7dd68aa339b4a740a7e0b2c52db1c364be173dbfb9e68d997c88d726b8ffc5c4a7fc343cc1b312b78210ab67f0bf64011feb79a32afcdef7ed3eeb5b5736eec2471407c8f50193842cc9049e9a1e8aa912410397d10bfb070c36f09b0fbe3471493264a63b2f1b912e2c0a5918683e70b621064c4b9c73cdd6d00a83ee0d6f903d0975f47fd49c5e846acd466657d8c82267c0d1f1f99733ea2c39b9017247260062af67f8439f2d0a8fbe0e44b6871da981c8804cd77c1b6444b7c5bacee52056841028aff213687a08a84f16c33e77853d3763605aaf917e7e15e8ca7db587966fde06d4b0d34655a8ea35149eb0f2d62adc699bd6c6f872dea6a898293fb12d0c9e8c929d3f47a5632a6027b6f6ff9b23f87ab1d817cbc263529a2154fcf2ed6d29b3d70dabd3e5ef1fbef84ced72bb1fc386b62898e97bb7f8ccd59bb3b902c4a5c57a51f0427ece724d2e4c56f868f2aa0b19fc6da54aebd33e98598be369c6e7510bba31381dc0080c2b2cb29e69295d0fb50e64ef75890d7cad3551f51b49d23a826ba7e3c9b4529741f2f8043bfd3c61d3dfd43d81a911c3a5ed1b1030d53c86aebcfb9439d10e6741e05c43211ab4d5f63bbd8448e5019370115f29218ac34728d68ffb1556e870fd561a499935b82f039827bd57d1606445b1b92b6887f90ce36ea92864c00bcccc8252f1721896d13cc3374ad9a2f463adcb9e6800b00acdc6935dadbf9dd8c2780bd2b22168789e673c0d04275e83cb9b6a8b3fbc6dd54dfb3bcd2a5a1f93739012efd7be7713b86ec56825f8a9f587e546817339cb0cb070faaf4c5343447646e517fa4a1e3d7f6ddfa061e5719d198edc3cd3cff3", "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"}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x0, 0x7ffff) r2 = mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={r2}) r3 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$input_event(r3, 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) r4 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000c80)={0x80000001, 0x1, 0x4, 'queue0\x00', 0x2}) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f00000001c0)={0x5ed}) write$binfmt_aout(r5, &(0x7f0000000d40)=ANY=[@ANYBLOB="0000fcffe6000000c70000000000000066000000000000000000000000000000cb70aae78ad9fa8c346f32ee02ef292715fa5fb73ab92d32795594c426e7ab97eefdecbdf11f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008819d73abeedb937b78eeba334d604f7ae"], 0x957) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1105511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0x0, 0x8, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff], [], [], 0x0, 0x0, 0x0, 0x0, "dfdefeeabb8b847f70a9f7faa4dddcee"}) 08:51:38 executing program 1: ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0x18) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) ustat(0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) ustat(0x0, &(0x7f00000000c0)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x480800, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) getgroups(0x6, &(0x7f0000000140)=[0xee00, 0xee01, 0xee00, 0xee00, 0x0, 0x0]) write$P9_RGETATTR(r1, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x22, {0x22, 0x4}, 0x10, r2, r3, 0x1, 0xfffffffffffffffe, 0x8, 0x7, 0x0, 0x10001, 0x4, 0x0, 0x0, 0x400, 0x2, 0x8, 0x7, 0x9ec3, 0x7fff}}, 0xa0) 08:51:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x17) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000000)={0x8001003, 0x0, 0x3}) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000100)={0x5, 0x9, 0x1000, 0x40, 0x4}) r2 = socket(0x1, 0x7, 0x4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0x7, 0x4) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x5) dup(r0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe0700000000000700ff3f07000000450001070000001419001a0004000200070000e2572b7b8094c302739bdd2a1ffc", 0x39}], 0x1) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) 08:51:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1600}, {&(0x7f0000000240)=""/147, 0x93}], 0x47, &(0x7f0000002740)=""/218, 0xda}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) r1 = getpgid(0x0) r2 = gettid() r3 = geteuid() r4 = getegid() sendmsg$netlink(r0, &(0x7f00000007c0)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000000}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000140)={0x80, 0x1a, 0x410, 0x70bd27, 0x25dfdbfb, "", [@generic="2cfb8f46f3121cb8b9574970b446d0855a160758e9fda25e95be2ef935e93dd12dff2c21393283e0b6bfe218ceddc31e2c0fc624c60df6914f2b6ab882fbcce99674fe3d6eb47174fc35d8a34e46fe214e562497ecf302945587daa20fa74baf72c992f4ff3712f01bf720d37069"]}, 0x80}, {&(0x7f0000000380)={0x2c8, 0x3c, 0x1, 0x70bd26, 0x25dfdbff, "", [@typed={0x8, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @nested={0x10, 0x20, [@typed={0xc, 0x2d, @u64=0x1}]}, @nested={0x1b8, 0x6, [@generic="fbb90fd1d30735167a7674d5baca35d8a3e029636f7347f49b7a5b5289fac4628ab1179c06d4e27285c4e9beab212fdff1c109c6ed8819e4a275ef708fd4895201bdaac25076b6b96c4f29ac0d5a667127accf4c447cdaaa8348842fc7668ec56de3222274c0c5111002ae4f5e1c0e66647a06c81304339884a3346c4607b6e81deb7b704895f30baf6d3ca2e1d0126b219687df0e8ec6d4641ce3b6508dad297ce8e756e7d8d05eebb5c79bd2807f", @typed={0xd8, 0x6b, @binary="296b6d999e0013fc016f8fc4c03f034ac76316256f5464899b3c28a48cc90be17bf84e67eb7df405ed175a4872cb0f6506c1fcf2dc3030724c1843ad8d2aa77ba809219486b0ffea2f255e36607d2043a69de129a8638403a55e68af21ef3d91699262c6e48479e7e0f2991b184d858af1d7def57fbf768ce011c40f1e442de770b964018e67aa99911635b42135932c3ff5a43b07437d9865d17ed48225b3ace1596d9c041209340b5bf4fa045ab24fa285f1831b0520f43955dcc9bbbc9a8488398ad068d15700579c7a7c25ced263e239"}, @generic="f213c3f818549e95c8b1d19e4acc41823ca0da4d92172501a1e38d1d732d2705d37eaed6feefaed1d573"]}, @nested={0xa0, 0x36, [@generic="e46e786488e84e86677cc332281035b38ace359499f2cdcea86a214e20103a6612413a7fdeb1d1f2b6317c1653433cf13566cda3bb8e9b9e01837ce0e516aa38acc53d97979f29f505efa3bfcb73fc858f328137cb9fe8ee6acac0a9608b453c6f70079f80ec0ee7a34e5ae9b26e7781a9d6eb862de8dc895dc172b2994cb6535afc9173b2707a9f6869037c5d943b2c79571be683f6ba6ae9"]}, @generic="a837a5850a989f2920b71438d1ddb6e95d6ecb6842f9f52dabf50eec487d90d10cd65cb1ac2e415f6d46e5acff48c2180a1d8902960a", @typed={0x8, 0x78, @ipv4=@dev={0xac, 0x14, 0x14, 0x11}}, @typed={0x8, 0x70, @ipv4=@rand_addr=0x7ff}]}, 0x2c8}, {&(0x7f0000000680)={0x118, 0x3c, 0x0, 0x70bd2d, 0x25dfdbfc, "", [@typed={0xc, 0x3f, @u64=0x2}, @typed={0x14, 0x70, @ipv6=@empty}, @generic="a5566395015e9fdfae64fea92b15c29452826b56601c1e2fc4869e5dc1e62d309766030438c8f518eba52f5b37bcc4927c489ae1c55743cf545ce58930d2067a528297cf54fa65985348010cb7ea4cb83cf2482adbb9b98e33bfcbdcfa447e0177397cd3050050675433a1bccb9ca9999bc284642062cd6dbae49510e6c675482a09bb837df8bc4ac496dbf78ae3b5c783e70489ea8eabbf0a70e3d0e67af6da15b219d2477413a9e2542e3fd2aa382937b03df78ed187ca1559a1ec8feaf007fb155a67e75c39b1286ea89e94dceeb2fbc7b102d15699d7bf7bb8adc22e6b0e666eb0f69f3b"]}, 0x118}, {&(0x7f0000002dc0)={0x1054, 0x1f, 0x2, 0x70bd26, 0x25dfdbfc, "", [@typed={0x8, 0x16, @pid=r1}, @generic="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", @typed={0x14, 0x37, @ipv6=@mcast1}, @generic="d6e8fbe0a767975bd1b0030aa517e958399105e9ee858dc4e950984dc00386bb38f3efd2adee2e"]}, 0x1054}], 0x4, &(0x7f0000000200)=[@cred={0x18, 0x1, 0x2, r2, r3, r4}], 0x18, 0x4}, 0x1) 08:51:38 executing program 2: prctl$PR_SET_TIMERSLACK(0x1d, 0x7fffffff) prctl$PR_SET_TIMERSLACK(0x1d, 0x8000) 08:51:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x12000, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) 08:51:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xf) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e0000000afcff", 0x58}], 0x1) openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x280, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x82, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0x2) 08:51:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000040), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000240)={{0x0, 0x8346}, {}, 0x0, 0x3}) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x1) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4018641b, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0xfff, 0x72e4fd47e09cfae9, 0x40, &(0x7f0000fff000/0x1000)=nil, 0x5}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:51:38 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) listen(r0, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x2}, 0x28, 0x2) 08:51:38 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x400000000000082) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000700)={@local}, 0x14) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x5f, @remote, 0x4e23, 0x2, 'lc\x00', 0xd, 0x4, 0x34}, 0x2c) 08:51:39 executing program 3: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x9) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x85) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440), 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0xfffffffffffffe77) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x10200000e) 08:51:39 executing program 5: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = syz_open_procfs(r0, &(0x7f0000000140)='net/igmp\x00') ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0xfffffffeffffffff, 0xf48}) fcntl$notify(r2, 0x402, 0x80000039) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000000)={0x0, 0x7530}, 0x8) 08:51:39 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'syzkaller0\x00'}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffeffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x4, 0xfffffffffffffffe, 0xd0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000280)={0x8001008, 0x3ff, 0x2}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x118, r3, 0xc00, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xf8, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) 08:51:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000003c0)='/dev/swradio#\x00', 0x1, 0x2) sendfile(r0, r1, &(0x7f0000000400), 0xb5f) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000380)={0xf368, 0x80000001, 0x3, 0xfffffffffffffff9}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) pipe(0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) tee(r0, r3, 0x10003, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x6) mkdir(&(0x7f00000002c0)='./bus\x00', 0x20) inotify_init1(0x800) setsockopt$inet_udp_encap(r3, 0x11, 0x64, 0x0, 0xffffffffffffffa5) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000440)=0x0) getpgid(r4) r5 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x800000000000000, 0x2, 0x1}, 0x20) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="386629bd7000885d0901003d750008000622b29000063f480d7b7f3a6d00000000000000000000000000000000f5f84542e476b827201b456b760f623f5a5d5bf7e5d84a46bbf8"], 0x1}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) getpgid(0xffffffffffffffff) openat$vsock(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000100)=0x0) r7 = syz_open_procfs(r6, &(0x7f00000006c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}\x053\xc1\xcb\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8TTs\xcb\xde\x84\x1d\xc7\xcc;\xb18\x14y\xdd\xcd\x89\xf517\xedkL\xa4\xbeq\xd7\x8dv\x83V') sendfile(r5, r7, &(0x7f00000000c0)=0x209, 0x5a) 08:51:39 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x44, 0x14, 0x20, 0x70bd2d, 0x25dfdbff, {0x2, 0x78, 0x18, 0xff, r1}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_CACHEINFO={0x14, 0x6, {0x5, 0x6, 0xe22, 0x800}}, @IFA_ADDRESS={0x8, 0x1, @empty}, @IFA_ADDRESS={0x8, 0x1, @multicast2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x0, 0x0) lseek(r2, 0x0, 0xfffffffffffffffd) 08:51:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') pipe2(&(0x7f0000000100), 0x800) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/148, 0xffffffffffffff5e}], 0x20000102, 0xa3) 08:51:39 executing program 1: r0 = socket$inet6(0xa, 0x400000000002, 0x0) r1 = dup(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x154, r2, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x36}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x20000811}, 0x1) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:51:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00001dcf48)=ANY=[@ANYBLOB="020300fd0e000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002000100000000000000e23b1b5c313ab47e83dd403000000000000005000500000000000a00000000000000fe8000"/112], 0x70}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f0000000040)) 08:51:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14012010}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000084}, 0xc4dc4d9061f813f) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101000, 0x0) recvfrom$unix(r3, &(0x7f0000000080)=""/223, 0xdf, 0x40, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80206433, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000200)={0xd000, 0x8000}) 08:51:39 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@random="e3bc6ddafe53", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r0 = msgget(0x1, 0x100) r1 = getuid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffff9c, 0xc044560f, &(0x7f0000000400)={0x7ff, 0x5, 0x4, 0x0, {r4, r5/1000+10000}, {0x3, 0xd, 0x1, 0x8, 0x1f, 0x100000001, "b7b23a6c"}, 0x8, 0x1, @fd, 0x4}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='nodev,\x00'}, 0x30) r9 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@caif=@dbg, &(0x7f0000000340)=0x80, 0x80800) setsockopt$TIPC_SRC_DROPPABLE(r9, 0x10f, 0x80, &(0x7f0000000380)=0x80000000, 0x4) ioctl$VIDIOC_DQEVENT(r6, 0x80785659, &(0x7f0000000480)={0x0, @motion_det}) r10 = fcntl$getown(0xffffffffffffff9c, 0x9) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x3f, r1, r2, r3, r7, 0xd5, 0xac}, 0xfffffffffffffffe, 0x1ff, 0x6, 0x2, 0x6, 0x40, r8, r10}) 08:51:39 executing program 1: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000180)='}\x00N\x06\x94\xe2\xe0\xe3\xab\xe1\x03\x1e\xc8\x8a\x17\x88\';g\xdd\x04r\x0e\x8d\xff{+\a/\xd2\x93\xa7\xcc=6\x15.f\xf4\xa2\x93\x91d&\x17\xc7\x82\x89\xe8\x95\"\xa9W\xbd\x91\x96\xd7=]\x9e\xe6\xf1I\v\x91z\xfa\xeb\xd1\x81\xc2j\x10 v\x93\xc7\xc9+\xc7\x8ds\x8f\x15\x8aR\xc3j\x80\xc3H\xf3%\'4\x11\x85a\xc6\x96\xd0gf*P\xfa\x1aET\x01\x05Y\xcaY\xc0!\xcf\xae\xb1\x9f{\xc0\x14F^\x8f\x8ej\xa17\x02\xdb\xd62\xdc\xadn\t\xa6z\xad\x9b\xbcf\x96\n\x81*\xcf0\x11\xaf\xbd\xd5\v\x1f\x10fuY\xc4\xd3\xf6V8\xc67\x85\xe8\xdfZ4Y\x9c\xdb^\xf9\xe3uv\xc9\xc6s\xde3E\x9c\fE\xd2\xce\xf5\x06\xc0\x8b\x86\xe0h\xae\xce\xb4\x16\x0f\xd4XRr\xcb0{R\"\xf6}\xb1s\xac\x7f\x80\xff{bM\x93\x90\xae\x1d1@G\"n3:5\xba\xbc[6 C\xad\x13\xb6;\xbfHZa\x81h\x91(\xb2\x13\xd6\xbe\xb2u.\xd4J\x9d\x1c\xd7\x8d+\v<]\xb0\xb6a\xe6A\x93\x1c\x98/\xdb\x11\xf7\xd9)\xe9?\xb8\xd1\xfe\x912\x8041\x82\x89\xad\x12v\x12\b%\xd1>\xb8\x99p\xd731\xae`!\xab3\nI\xfc\x03*\xc7\xd1x\xe6\xc3\xf4 d\xa4\xb0\xb2?\xf1\xd7\x81\xb7\xc2\x15\xbd\x8f\xf3\xa6;\br\f4\xfd\xce\x8b\x90\xf6\xf7\x95\xc7\x1f\xe2~\x14\xdf6+P\x10\xb5\x83,\xf6,\x82@b!\xb5N\xfd\xe0\xeek\xe3\x1a\rJjT\xa5\x1cYt2L\x02\x1a.v\xd6\x01\x7fd\xf3*~\b,}\xc3m}\xf8\xe4\xec', 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000000c0)=""/15, &(0x7f0000000100)=0xf) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, &(0x7f00002e4000)='./file\xff\xff', &(0x7f0000000000)=ANY=[], &(0x7f0000001ffc), 0x1400) 08:51:39 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x1f, 0xfffffffffffffffd}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000001c0)={r2, 0x2, 0x7, "9e591b405cd240"}, 0xf) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r1, 0x11, 0x68, &(0x7f0000000040)=0x22, 0xa1c1) r3 = dup3(r1, r0, 0x80000) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000240)={0xffffffff, 0x1, 0x5, 0x0, 0x0, [{r3, 0x0, 0x401}, {r0}, {r3, 0x0, 0x6}, {r3, 0x0, 0x6}, {r1, 0x0, 0x1}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e23, 0x1, @rand_addr="c8ea8a52b3fec25d2e6ca4871689b7ab", 0x8000}}, 0x1661, 0x8000}, &(0x7f00000003c0)=0x88) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000200)={0xee, 0x3, 0x10000, 0x7, 0x10, 0x9, 0x88, 0x1, 0x6, 0x10001, 0xda}) r4 = syz_open_dev$radio(&(0x7f0000000400)='/dev/radio#\x00', 0x0, 0x2) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, 0x0) read$alg(r4, &(0x7f0000000840)=""/115, 0x73) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$mouse(0x0, 0x401, 0x12602) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4000, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r5, 0x0, [0x305f, 0xa, 0x300]}, 0x2c) socket$l2tp(0x18, 0x1, 0x1) 08:51:39 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) mincore(&(0x7f00001ad000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/156) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x5, 0x30}, &(0x7f0000000140)=0xc) connect$unix(r1, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x8001, 0x7}, &(0x7f0000000240)=0x8) mprotect(&(0x7f0000181000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 08:51:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x144) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r1 = socket$packet(0x11, 0x8000000003, 0x300) r2 = open(&(0x7f0000000200)='./file0\x00', 0x8400, 0x0) mkdirat(r2, &(0x7f0000000100)='./file0\x00', 0x1) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1}, 0x4) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000140)=""/143) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "c57e21a776183e476462f0fb3923b96e277ff09a"}, 0x15, 0x2) 08:51:39 executing program 3: set_mempolicy(0x0, &(0x7f0000000140)=0x6, 0x9) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x85) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440), 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0xfffffffffffffe77) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x10200000e) 08:51:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x8, 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x200001, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000240)=""/215) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffea4, &(0x7f0000000100)={&(0x7f0000000000)={0xffffffffffffff5f, 0x36, 0x829, 0x0, 0x0, {0x2803, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xfeffffff00000000}}]}]}, 0x2c}}, 0x0) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40000) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x2}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r3, 0x3f}, 0x8) prctl$PR_GET_TIMERSLACK(0x1e) 08:51:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x20000f722, 0x100) ioctl$BLKIOOPT(r0, 0x4c05, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000100), 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0x485830dfbb0691da) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x9, 0x7ff, 0x81, 0x71, 0x0, 0x2, 0x0, 0x4, 0x8001, 0xfffffffffffffffa, 0x40, 0x100, 0x100, 0xf311, 0x3, 0x2, 0x1, 0x1, 0xe2b6, 0x1, 0x0, 0x4, 0x1ff, 0x5, 0x6, 0x4f3c, 0x7f, 0x9, 0x4, 0x1000, 0x1, 0x7fff, 0x0, 0x80000001, 0x1, 0xdd9, 0x0, 0x854b, 0x4, @perf_config_ext={0x0, 0x101}, 0x20001, 0x0, 0x6, 0xf, 0x1000, 0x100, 0xffffffffffff0000}, r2, 0x4, r0, 0xb) ptrace$peek(0x3, r2, &(0x7f0000000140)) 08:51:39 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x40000, 0x101400) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="5300000044a6aeabec2e15fc1772f184bc1b3f1000ff03d811e329994017db9820000000003b08d4da0d0e2dcabd7a50ffffb3560000080000ab31c357e3972f415ff5cb88b9ce837c5901009e9f5d383d24fc573d90de5b"], 0x58) r1 = dup(r0) sendmmsg$alg(r1, &(0x7f0000001940)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000080)="a3c99714044cb2edd4a8531fcae60e4b4b8f942ab2de3ad9e98b348233cf371d2ac83225d9dbb3720039fa659b0575de582766250965c87f9bdfaff89d971b96783e7c57a6b8b05534b35a40a19cb9be5b520c7503ac93fd8469de30d695f801133604ff0acbf13fd546824183e2e1d2b1f065b8f42e2ff9765a316912e33d66e87a0b5a0f9dbeb0746a6538eda9f0489e287b3924", 0x95}, {&(0x7f0000000140)="30c2e179847eec7ad686d3fb20c53007d2d5530f13e1c09e505eb5be7c9cb3e34e9446ca7a577476c86b652f46", 0x2d}, {&(0x7f0000000180)="570cf43fe65c70ef637717ae730cc14e9d16170ddfe6ac4166973992d168bc6214e0d33ca200357204c0c3b4887486a2b1fd22a7d59e3f7ccff7fc200f7731273aab1aab456a4d3d668fe75609655709da000a4dae3f58901ce8a2e22800e458ac946d16be4e2c6957df46b503190b8f2a440e456e33384ac0985523281c14085bef77753bd2a429e336d04b7e3eb4a8e822bc19895fbb6b8df5f57639d60c32db386a4da18e19952d57d9b39855506d9b2c3b81c316cc71cc2e10165dfc9a74", 0xc0}, {&(0x7f0000000280)="03ef996bbf32b8415f02dda69e168c36eca54322558b2f20defba014af73ce3b10df145c15a0d5e5edb85bca6b44bd327960ba1a3b92672bd1f87086863aa924958baf71a00b6346723617c7ddaf5273acb1344b4560981d8408994e24", 0x5d}, {&(0x7f0000000300)="759fc2a4c3f0598a446d64d76abf58e86ffa1b098e124047c687", 0x1a}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="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", 0xfb}, {&(0x7f0000001440)="edd25827bcf8fba8f3fb2274d2d9fd4b0ab92de9bf20ebdfc9d679b367e3f4f2ccb80ab5afce4ee48a4f3f29d218909868bda9f4a802ba5a0d9df7902135a47c1d04d6ffde2c2b2be4d281b45b4d58d697a67f838944c62f997b8eb503161f2466c32354b630c8e32fe492768abfd7809d34adebf1f61639c419bba460bd76cb9cdfa7d569e2ab363db1f3ce9a8972e36722779160b8404952", 0x99}, {&(0x7f0000001500)="c9624bdf33e56393a657edbf5d64ec61f85d70f21bbf3fd84959200205ebe898f7656ec176843d5157552081f5b25242bd91dee276f3d3c0e9e8b50844867f01336abc3c3a1187e0b8afb6c67f0111c932be0b9c2f8a1eba05a922a973d7374c26e63f5aed5114b9cfce046e9cb160f6adb5866e7522ac653140cdfefda5433e1bfa60f4be5e5e55364462f4d74c9799f56071a5e5e9354e114460e36c5d47022a7e62e6dfffcbedc4def0d86c0178fa626bb183e97e73ef90", 0xb9}], 0x9, &(0x7f0000001980)=ANY=[@ANYBLOB="1000000017010000030000000100000010000000170100000300000001000000100000001701000003000000010000001000000017010000030000000100000010000000170100000300000001000000100000001701000003000000010000003800000017010000020000002500000052b8099cde9dcde48bf37edf5bdd1071744f2481b789e5f2921dc124cc40784b100198c2cb00000010000000170100000300000001000000100000001701000004000000c2030000d3b4f903c0f2e12e7ac202a6d870b48bd230dfcd2f043c86c49e1d6155cb03a74968edbdeedfb9396f2c6f292b299451e4b684"], 0xb8, 0x4000010}, {0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="1173758047f66697fa4e321cae2cd0f957d65a6a61eeda52367b42187d8903ff86a5a9892149c028f78ecb68c81efada6f39aaf34bb7cfb2166b70583adf232863f8b8a5009c396e2aa51cc497a1ae63805bc32e6fe2fb66b1f44b8ad45cbf6b5206dfa27ae55ff36cc31841041edc5589c41e71830bd02a366e9f644c9bfc89ca137587e07d8a83aee95afeca3ad57f25b1ba3b998beb3ca508573c4b07a9ae3602980c133d5abf049f5641a62fe78cd48b9cf0e9", 0xb5}], 0x1, &(0x7f0000001800)=[@assoc={0x10, 0x117, 0x4, 0x4}, @assoc={0x10, 0x117, 0x4, 0x80}, @assoc={0x10, 0x117, 0x4, 0x3ff}, @iv={0x60, 0x117, 0x2, 0x4f, "f1014a26e06545f76a49a1059b47c28d8eaed9edf9d4a092aaf3a19fbb60e5d1be48ed099ec22ca65e5a6f5a71ecc7a4e9106f63fe5eafb7fffcfbb82e9b52ade10d99415707f6d1b53e179782e008"}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0x3}, @op={0x10, 0x117, 0x3, 0x1}, @iv={0x68, 0x117, 0x2, 0x56, "9d58bbd2320b5fb143f929d63a23c27ea2ac14191a924950d3ebe03710e8c05da506f8faa96046645b9ce0fbce658647abc667486928287989dc2bb1dfec47b931e538763ed6e2b7ec02ed07925ecd4a9e73b6768d66"}], 0x128, 0x4000}], 0x2, 0x1) 08:51:39 executing program 2: syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) poll(&(0x7f0000005040), 0x0, 0x6) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x400, 0x0) 08:51:39 executing program 4: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x800) fcntl$setflags(r0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000040)={0x401, 0x5, 0x6, 'queue0\x00', 0x3f}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x6, 0x4, 0x26, 'queue0\x00', 0x1f}) ioctl(r1, 0x7, &(0x7f0000000040)) 08:51:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x20800, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000140)=0x204000000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote}, 0x14) 08:51:40 executing program 0: r0 = userfaultfd(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) flock(r0, 0xfffffffffffffffe) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x80000001, 0x56, 0x0, 0x3, {0x5, 0x0, 0x0, 0x5, 0xbaba, 0x0, 0x0, 0x20, 0x4, 0x7ff, 0x9, 0xff, 0xfffffffffffffffd, 0x7, "e7e33a992e7b4ab5cd07021b7b4442e0867ddf231278ed2ed7f06e4660f2b755"}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x449c73fe, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) 08:51:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11010000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xf8, r1, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x34}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xef}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_NET={0x74, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x32c}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfb}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffa66}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6a}]}]}, 0xf8}}, 0x4000) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000700)={0x10, 0xfffffffffffffffe, 0x8}, 0x10) 08:51:40 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+10000000}, 0x0) tkill(r0, 0x15) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xdd, 0x101000) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1f, 0x3f, 0x0, 0x0, 0x3, 0xffffffffffffff9c, 0x2, [], r3, r2, 0x101, 0x8}, 0x3c) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000140)) 08:51:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r3, 0xfffffffffffffffa, 0x20}, &(0x7f00000000c0)=0xc) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000140)={0x101, 0x1}) 08:51:40 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0xfffffffffffffffe) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000280)) [ 113.472191][ T7942] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 08:51:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/hci\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x0, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x24000800) syz_open_pts(r0, 0x100) 08:51:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='user.syz\x00', &(0x7f00000002c0)=""/89, 0x59) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0) umount2(&(0x7f00000001c0)='.\x00', 0xffffffffffffffff) 08:51:40 executing program 0: r0 = userfaultfd(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)='t\b\x00\x00\xf9\xff\x85nG\x13g\xa6\x05', 0x0) flock(r0, 0xfffffffffffffffe) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(0xffffffffffffffff, r1, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x80000001, 0x56, 0x0, 0x3, {0x5, 0x0, 0x0, 0x5, 0xbaba, 0x0, 0x0, 0x20, 0x4, 0x7ff, 0x9, 0xff, 0xfffffffffffffffd, 0x7, "e7e33a992e7b4ab5cd07021b7b4442e0867ddf231278ed2ed7f06e4660f2b755"}}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x449c73fe, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) 08:51:40 executing program 5: r0 = socket$inet6(0xa, 0x80005, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0xb, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) 08:51:40 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x220, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x20}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x24000000) r2 = socket(0x40000000015, 0x805, 0x0) getsockopt(r2, 0x114, 0x2720, 0x0, &(0x7f0000000000)) 08:51:40 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x3) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x1) write$UHID_INPUT(r0, &(0x7f00000000c0)={0x8, "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", 0x1000}, 0x1006) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x7) 08:51:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:51:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d02]}) r3 = fcntl$dupfd(r2, 0xca959f95457e52, r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) fchownat(r3, &(0x7f0000000100)='./file0\x00', r4, r5, 0x1d00) r6 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200000, 0x0) ioctl$RTC_EPOCH_READ(r7, 0x8004700d, &(0x7f00000000c0)) setsockopt$bt_BT_RCVMTU(r6, 0x112, 0xd, &(0x7f0000000040)=0x8, 0x2) 08:51:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0xffffffffffffffd3) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom$unix(r1, &(0x7f0000001140)=""/4096, 0x11c6, 0x0, 0x0, 0x0) 08:51:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) close(r0) sendto$inet6(r0, &(0x7f0000000080)="80", 0x1, 0x801, 0x0, 0x0) close(r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'ip_vti0\x00', 0x2}) splice(r0, 0x0, r2, 0x0, 0xc0, 0x0) 08:51:40 executing program 3: llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=""/215, 0xd7) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x100) getpeername$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0xffffffffffffff34) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000000c0)={@loopback, r1}, 0x14) ioctl$PPPIOCNEWUNIT(r0, 0x40044102, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)=0x7, 0x4) [ 113.939617][ T7980] kvm: pic: non byte write [ 113.959732][ T7980] kvm: pic: non byte write [ 113.966762][ T7980] kvm: pic: non byte write 08:51:40 executing program 5: get_mempolicy(0x0, &(0x7f0000001140), 0xfffffffffffffbff, &(0x7f0000ffb000/0x2000)=nil, 0x2) 08:51:40 executing program 4: fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x1}, {0x7fffffff}]}, 0x18, 0x1) r0 = syz_open_procfs(0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000300)=""/194) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgrp(0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) getpid() fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r3 = getpgid(r2) r4 = perf_event_open(0x0, r3, 0x0, r1, 0x1) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x79c}) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x06rist\xe3cusgrVid:De', 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='attr/fscreate\x00') move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f0000c64000/0x1000)=nil, &(0x7f0000c62000/0x4000)=nil], 0x0, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r6, 0x402c5342, &(0x7f0000000280)={0x3, 0x9, 0x86, {0x77359400}, 0x5, 0x7fffffff}) r7 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(r7, 0x0, 0x1, &(0x7f0000000200), 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) [ 114.004470][ T7980] kvm: pic: non byte write 08:51:40 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8927, &(0x7f0000000000)={'vcan0\x00', 0x0}) [ 114.044384][ T7980] kvm: pic: non byte write [ 114.061881][ T7980] kvm: pic: non byte write 08:51:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0xffffffffffffffd3) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom$unix(r1, &(0x7f0000001140)=""/4096, 0x11c6, 0x0, 0x0, 0x0) [ 114.088125][ T7980] kvm: pic: non byte write 08:51:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='batadv0\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x106, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000ebffe7030000000000000000ec00380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000"], 0x58) [ 114.110291][ T7980] kvm: pic: non byte write [ 114.145338][ T7980] kvm: pic: non byte write [ 114.161348][ T7980] kvm: pic: non byte write 08:51:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0xa6fe, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:51:41 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000340), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d}) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x287) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, 0x0, 0x246) sendto$inet(r3, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1edc) accept4$unix(r3, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0) r4 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x100, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000005c0)={0x64ca, 0xffff, 0x0, 'queue1\x00', 0x2}) mq_timedreceive(r4, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73") perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) 08:51:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0xc0000101}]}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x10001) 08:51:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) socketpair(0x11, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000300fa74437d49a2b2b2611c8ea98cfb916f8c402145253140317b2f1b9c14ce5e61a16d4f431f0d980df994dace1b62e37633a5da2f9d689511c725f1a15c88c313e300"/82]) r2 = syz_open_dev$usbmon(0x0, 0x9af, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mISDNtimer\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc00c64b5, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000006c0), 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f00000002c0), &(0x7f0000000300)=0x4) socket$inet(0x2, 0x6, 0x9) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f00000001c0)) prctl$PR_SET_UNALIGN(0x6, 0x2) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x40032, r3, 0xf) 08:51:41 executing program 3: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x101000, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xffffffff) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100), 0x0) 08:51:41 executing program 4: fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000001c0)=@v3={0x3000000, [{0x0, 0x1}, {0x7fffffff}]}, 0x18, 0x1) r0 = syz_open_procfs(0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000300)=""/194) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgrp(0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) getpid() fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r3 = getpgid(r2) r4 = perf_event_open(0x0, r3, 0x0, r1, 0x1) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x79c}) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x06rist\xe3cusgrVid:De', 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)=0x0) r6 = syz_open_procfs(r5, &(0x7f0000000100)='attr/fscreate\x00') move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f0000c64000/0x1000)=nil, &(0x7f0000c62000/0x4000)=nil], 0x0, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r6, 0x402c5342, &(0x7f0000000280)={0x3, 0x9, 0x86, {0x77359400}, 0x5, 0x7fffffff}) r7 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(r7, 0x0, 0x1, &(0x7f0000000200), 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) 08:51:41 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), 0x1) 08:51:41 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0x0, 0x3, 0x3, {0x81, 0x2, 0x0, 0x8}}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x800000805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, 0x0) 08:51:41 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2000, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000180)) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$PPPIOCSPASS(r0, 0x40087447, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x6, 0x6, 0x1f, 0x6}, {0x80000000, 0x4, 0x101, 0x3f}]}) inotify_init() ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000000c0)={0x2000, 0x11a000}) 08:51:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000003c0)) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x10001, &(0x7f00000000c0)=0x29a) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000280)={0xfffffffffffffffd, 0x101, 0xfffffffffffffff8}) r2 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000015) [ 114.820497][ T8059] input: syz0 as /devices/virtual/input/input5 08:51:41 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2202, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="0800000002004e23ac14141300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4fbe6eb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000300000002004e24e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffffffffffff00"/506], 0x20c) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) getsockopt$inet_tcp_int(r0, 0x6, 0x27, &(0x7f00000002c0), &(0x7f0000000300)=0x4) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 08:51:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'lo\x00@\x10\x00\x00\x00\x00\x05\x00', 0x1}) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x40) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000340)={0x34, 0x33, 0x1, 0x5, 0x9, 0xfffc, 0x3, 0x158, 0x1}) r2 = socket$inet(0x2, 0x80f, 0x1000005) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f00000003c0)={0x0, 0x98, 0x1, &(0x7f0000000380)=0x66ed}) write$P9_RCLUNK(r1, &(0x7f0000000300)={0x7, 0x79, 0x1}, 0x7) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f00000000c0)=0x3f) recvfrom(r2, &(0x7f0000000140)=""/154, 0x9a, 0x40, &(0x7f0000000240)=@xdp={0x2c, 0x1, r3, 0xc}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x04\x00\x00\x00\x00\x00Jk\x00'}) dup3(r0, r2, 0x0) [ 114.964173][ T8074] input: syz0 as /devices/virtual/input/input6 08:51:41 executing program 5: r0 = socket(0xfffffffffffffffe, 0x800000003, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x8, 0x800, 0x1f39}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={r1, 0x5, 0x4}, 0x8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x280, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r4) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0x7, 0x0, 0x7e}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_int(r5, 0x1, 0x7, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x80900, 0x0) signalfd(r6, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f00000001c0)={0x0, 0x0, {0x81, 0x2, 0x0, 0xfffffffffffffc01}}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f004}) ioctl$KVM_RUN(r4, 0xae80, 0x400000000000000) bind$rxrpc(r5, &(0x7f0000000340)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x24) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x0, 0x4, 0x100, 0x1, 0x5, 0x23}, 0x9}) ioctl$sock_SIOCETHTOOL(r0, 0x891f, &(0x7f00000000c0)={'vca\xd1:\xc0\b\x00', 0x0}) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f0000000400)) 08:51:41 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000340), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d}) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x287) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, 0x0, 0x246) sendto$inet(r3, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1edc) accept4$unix(r3, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0) r4 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x100, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000005c0)={0x64ca, 0xffff, 0x0, 'queue1\x00', 0x2}) mq_timedreceive(r4, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73") perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) 08:51:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x1c, r1, 0x28, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x51}, 0x8000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20800, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0xee85, @rand_addr="0b50523f2dab321eb0055da27e24a274", 0xf3d}}, 0x715, 0x0, 0x9, 0x80000000009, 0x120c1286}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000140)={r3, 0x1, 0x286c, 0x6}, &(0x7f0000000180)=0x10) read(r0, 0x0, 0x0) 08:51:41 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x20, 0xfffffffffffffe65) connect$unix(r0, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000280)={{0xa, 0x7, 0x2, 0x6e3, 'syz0\x00', 0x8}, 0x2, 0x20, 0xa64, r1, 0x4, 0x200, 'syz0\x00', &(0x7f0000000240)=['/dev/qat_adf_ctl\x00', '/dev/qat_adf_ctl\x00', '\x00', '&\x00'], 0x25, [], [0x80000000, 0x6, 0x3, 0x7]}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000001c0)=@buf={0xc, &(0x7f0000000180)="448ee75afa617910d7457cec"}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000500)=@req={0x20, &(0x7f00000004c0)={'team_slave_0\x00', @ifru_flags}}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$PPPIOCGL2TPSTATS(r0, 0x40096101, &(0x7f00000000c0)="0500000009002224fe") ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000100)={0x5, "752dbe1fd719eb842fb68cb36ab9ae6e6b101f138a563c820c2758014f32330b", 0x8, 0x7, 0x6, 0x9, 0x5}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x5, &(0x7f0000000440)=[{0x7f, 0xdb3, 0x7fffffff, 0x400}, {0x21, 0x9, 0xd, 0x4}, {0x0, 0xe04, 0x9, 0x80000000}, {0x50, 0x20000d, 0x800, 0x101}, {0x5, 0x6, 0x0, 0x725}]}, 0x8) socket$l2tp(0x18, 0x1, 0x1) [ 115.260340][ T8093] QAT: Invalid ioctl 08:51:42 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000340), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d}) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x287) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, 0x0, 0x246) sendto$inet(r3, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1edc) accept4$unix(r3, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0) r4 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x100, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000005c0)={0x64ca, 0xffff, 0x0, 'queue1\x00', 0x2}) mq_timedreceive(r4, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73") perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) [ 115.303246][ T8093] QAT: Invalid ioctl [ 115.331537][ T8093] QAT: Invalid ioctl 08:51:42 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000340), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d}) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x287) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, 0x0, 0x246) sendto$inet(r3, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1edc) accept4$unix(r3, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0) r4 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x100, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000005c0)={0x64ca, 0xffff, 0x0, 'queue1\x00', 0x2}) mq_timedreceive(r4, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73") perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) [ 115.355862][ T8093] QAT: Invalid ioctl [ 115.381516][ T8093] QAT: Invalid ioctl [ 115.408955][ T8093] QAT: Invalid ioctl [ 115.424592][ T8093] QAT: Stopping all acceleration devices. [ 115.432488][ T8093] QAT: Invalid ioctl [ 115.464578][ T8093] QAT: Invalid ioctl [ 115.468765][ T8106] QAT: Invalid ioctl [ 115.501574][ T8106] QAT: Invalid ioctl [ 115.564877][ T8093] QAT: Invalid ioctl [ 115.576724][ T8107] QAT: Invalid ioctl 08:51:42 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000340), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d}) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x287) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, 0x0, 0x246) sendto$inet(r3, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1edc) accept4$unix(r3, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0) r4 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x100, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000005c0)={0x64ca, 0xffff, 0x0, 'queue1\x00', 0x2}) mq_timedreceive(r4, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73") perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) [ 115.609865][ T8108] QAT: Invalid ioctl [ 115.629865][ T8106] QAT: Invalid ioctl [ 115.635549][ T8093] QAT: Stopping all acceleration devices. 08:51:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000003c0)) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x10001, &(0x7f00000000c0)=0x29a) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000280)={0xfffffffffffffffd, 0x101, 0xfffffffffffffff8}) r2 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000015) 08:51:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000080)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000040)=0xba) write$binfmt_misc(r0, 0x0, 0x0) 08:51:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x2) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000100)="f7", 0x1}], 0x1) 08:51:42 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x6, 0x0, 0x8000}, 0x4) r1 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x600) socket$packet(0x11, 0x3, 0x300) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) [ 116.075281][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 116.081949][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 116.144155][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 116.150108][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:51:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) 08:51:43 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000340), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d}) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x287) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, 0x0, 0x246) sendto$inet(r3, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1edc) accept4$unix(r3, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0) r4 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x100, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000005c0)={0x64ca, 0xffff, 0x0, 'queue1\x00', 0x2}) mq_timedreceive(r4, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73") perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) 08:51:43 executing program 5: socket$bt_cmtp(0x1f, 0x3, 0x5) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e}) [ 116.464124][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 116.470005][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:51:43 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video35\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x1, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc0f8565c, &(0x7f0000000040)={0x0, 0x17b, 0x4, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0xfffffffffffffffc}]}}}) ioctl$VIDIOC_STREAMON(r0, 0xc0cc5605, &(0x7f0000000000)=0x2) 08:51:43 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000237, 0xfffff000) perf_event_open$cgroup(&(0x7f00000001c0)={0x6, 0x70, 0x1, 0x0, 0x1f, 0x2, 0x0, 0x200, 0x80000, 0x8, 0x20, 0x4, 0x9, 0x1ff, 0x6, 0x100000000, 0x100000000, 0x2, 0x4, 0x9, 0x9, 0x5, 0x9, 0xff, 0xdd9, 0x0, 0xaa25, 0x7fff, 0xffffffffffffffff, 0x50d, 0x101, 0xfffffffffffffffd, 0xfff, 0x6, 0x100000000, 0x5, 0x5c86, 0x1c8, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000180), 0xf}, 0x22400, 0xa320, 0x9, 0x8, 0x20000, 0x28, 0x9}, r0, 0xb, r1, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r3, 0xa}}, 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0245720, &(0x7f0000000240)={0x0, {0x0, 0x989680}, 0x100000000, 0x9}) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0xc46cf9e3b3ccdc26, 0x4) syncfs(r0) 08:51:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @loopback}, {0x2, 0x0, @local}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f}}, 0x20) write(r0, &(0x7f0000000140)="150000000800080000000000c86b6525000010", 0x13) [ 116.597189][ T8145] vim2m vim2m.0: vidioc_s_fmt queue busy [ 116.620397][ T8148] vim2m vim2m.0: vidioc_s_fmt queue busy 08:51:43 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x2, 0x30}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x2}, &(0x7f0000000100)=0x8) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280)='ecryptfs\x00', 0x0, 0x0) 08:51:43 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) prctl$PR_SET_NAME(0xf, 0x0) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/227, 0xe3}], 0x1}, 0x0) recvfrom(r1, &(0x7f0000002240)=""/4096, 0x1000, 0x2100, 0x0, 0xffffffffffffff99) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) 08:51:43 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x173) mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000140)) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x30, 0x4) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) [ 116.760700][ T8162] Error parsing options; rc = [-22] 08:51:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x20000, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) [ 116.784649][ T8163] Error parsing options; rc = [-22] 08:51:43 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "c2d93a", 0x8, 0x0, 0x0, @mcast2, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') getegid() 08:51:43 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x200, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x0, 0x3, 0x8, 0x7, 0x299b1c4e}, &(0x7f0000000000)=0x98) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x78000, 0x0) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000300)=0x5) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000001c0)={r3, 0x9}, 0x8) sendmmsg$alg(r2, &(0x7f0000000380)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="b5", 0x1}], 0x1}], 0x1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000200)={0x8, 0xfff, 0x700000000, 'queue0\x00', 0x2}) 08:51:43 executing program 4: clock_settime(0xdec2c09dd35a0d23, &(0x7f0000000040)={0x0, 0x1c9c380}) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000080)='\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffffffffc01, @ipv4={[], [], @multicast2}, 0x5}, r1}}, 0x30) 08:51:43 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000340), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d}) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x287) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, 0x0, 0x246) sendto$inet(r3, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x1edc) accept4$unix(r3, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0) r4 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x100, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000005c0)={0x64ca, 0xffff, 0x0, 'queue1\x00', 0x2}) mq_timedreceive(r4, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73") perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) 08:51:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000022c0)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='numa_maps\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x2000000) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) 08:51:43 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x8b3}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000500)={0x0, 0x45, "d7a9c51b666b97edf4f842c71f37f7cd8038cc259fcfc497dd87b02a60b44ca2d453727cb560f4eba98f14aded3c215ad65fab34c279274d6028c07e93af099aa46c024854"}, &(0x7f0000000580)=0x4d) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={r1, 0x101, 0x4, 0x0, 0x5, 0x0, 0x9, 0x3, {r2, @in={{0x2, 0x4e20, @remote}}, 0xffffffffffffffff, 0x80, 0x2, 0x6, 0x3}}, &(0x7f0000000680)=0xb0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$TIOCSBRK(r0, 0x5427) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[@ANYBLOB="e0010000", @ANYRES16=r3, @ANYBLOB="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"], 0x1e0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x5, 0x2) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f00000001c0)=0x2) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000020000002000040e00000010000000000000000080012000000020000000000000000000600000000000000000000000000000000000000000000001e807552dd1d3e49ac1414bb000000000000000000000000030005000020000002000000e00000010000000000000000"], 0x80}}, 0x0) 08:51:43 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', 0x0, 0x28e, 0x0) 08:51:43 executing program 3: ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40186417, &(0x7f0000000400)={0x9, 0x1, 0x0, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x101000) socket$rds(0x15, 0x5, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) 08:51:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x200) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000240)={[], 0x0, 0x3f, 0x7fffffff}) 08:51:44 executing program 5: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r1 = gettid() prlimit64(r1, 0xc, &(0x7f0000000140)={0x0, 0x7}, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0), &(0x7f0000000200)=0xb) getdents(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r3, r2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x3e3) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x2db) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0xffffffc7) 08:51:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x10000, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000080)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x3) ioctl$TIOCGRS485(r0, 0x80047456, 0x0) 08:51:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) write$vnet(r1, &(0x7f0000000140)={0x1, {0x0, 0x0, 0x0}}, 0x68) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc0445609, &(0x7f00000001c0)={0x0, 0x5, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ef73d37e"}, 0x0, 0x0, @fd, 0x4}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000080)=[{r0, 0x200}], 0x1, &(0x7f0000000100)={r2, r3+30000000}, &(0x7f0000000200)={0x401}, 0x8) 08:51:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'eql\x00\x00\xdf\xdd\x94D\x8f\x15\xcf!\x00', 0xec38ed91f1c74952}) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0xc}, 0x2, 0x0) ioctl$TUNSETPERSIST(r0, 0x800454e0, 0x3) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) connect$rds(r1, &(0x7f0000000180)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f00000000c0)) 08:51:44 executing program 1: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000000c0)=0xffb, 0x208) bind$inet(r0, &(0x7f0000000000)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2000200007f9, &(0x7f0000000040)={0x2, 0x200000004e21, @multicast1}, 0xfffffffffffffe23) setsockopt$sock_int(r0, 0x1, 0x800000000008, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f00000012c0)="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", 0xffc, 0xffffffffffffffff, 0x0, 0x0) fcntl$getflags(r0, 0xb) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xffc}], 0x1}, 0x400100) sendto(r0, &(0x7f0000000280)="d9", 0x1, 0x0, 0x0, 0x0) 08:51:44 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000140)=0x8, 0x8) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000080)) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000100)={'syzkaller0\x00', {0x2, 0x4e20, @loopback}}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', r2}) 08:51:44 executing program 2: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x7}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x10, &(0x7f0000000540)=[@in={0x2, 0x4e21, @empty}]}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000440)={r1, 0x3, 0xeb21, 0x2, 0x1f, 0x7, 0x6, 0x3ff, {r2, @in6={{0xa, 0x4e22, 0x6, @ipv4={[], [], @multicast1}, 0xb0e}}, 0x9, 0xb0, 0x3f, 0x40, 0x6}}, &(0x7f0000000500)=0xb0) r3 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000280)=0x1) r4 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f00000000c0)=0x10, 0x80800) getsockopt$inet_opts(r4, 0x0, 0xd, &(0x7f0000000180)=""/255, &(0x7f0000000100)=0xff) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000080)=""/33, 0x200000d7}], 0x1) 08:51:44 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x1, 0x4800) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000000)={0x7f, @broadcast, 0x4e22, 0x4, 'ovf\x00', 0xf, 0x7, 0x49}, 0x2c) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000180)={r3, 0x5}) r4 = msgget$private(0x0, 0x40) msgctl$MSG_INFO(r4, 0xc, &(0x7f0000000280)=""/104) getsockname$inet(r2, &(0x7f0000000200), &(0x7f0000000240)=0x10) 08:51:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getpeername$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) accept4$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14, 0x800) getsockname$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000580)={0x0, @remote, @multicast1}, &(0x7f00000005c0)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000005ec0)={@mcast1, 0x0}, &(0x7f0000005f00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005f40)={{{@in6=@mcast2, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000006040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000060c0)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000061c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006200)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000006300)=0xe8) accept4$packet(r1, &(0x7f0000006800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006840)=0x14, 0x80800) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40047705, &(0x7f0000000640)={0xd44, 0x401}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000006880)={'sit0\x00', 0x0}) write$P9_RLCREATE(r1, &(0x7f0000000600)={0x18, 0xf, 0x1, {{0x2, 0x0, 0x4}, 0xffffffffffffff80}}, 0x18) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000068c0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000069c0)=0xe8) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000006ec0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x82280001}, 0xc, &(0x7f0000006e80)={&(0x7f0000006a00)={0x448, r3, 0x800, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}]}}, {{0x8, 0x1, r5}, {0x80, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x16c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7e}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}]}}, {{0x8, 0x1, r11}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x51d2}}}]}}, {{0x8, 0x1, r12}, {0x1a8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xc000000000}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}]}}]}, 0x448}}, 0x801) sendfile(r2, r1, 0x0, 0xfc) 08:51:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x40, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r1, 0x0, 0x1}) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000080)={0x0, r2, 0x1}) 08:51:44 executing program 4: process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b40)=""/67, 0x43}], 0x1, 0x0) syz_open_dev$sndmidi(0x0, 0x400, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0x80) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0)=0x48, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x361, 0x0) 08:51:44 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40246608, &(0x7f0000000000)={0xfe, 0x7, 0x200000, 0x7, 0x8, 0x200}) 08:51:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:45 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x10000) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000080)) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000840)={0x0, 0xa, 0x1, {0xb, @pix={0x0, 0x1f}}}) ioctl$VIDIOC_QBUF(r1, 0xc058565d, &(0x7f0000000600)={0x0, 0xb, 0x4, 0x0, {}, {0x7, 0x0, 0x0, 0x0, 0x0, 0x0, "00cc0700"}, 0x0, 0x0, @userptr=0x100000001, 0x4}) 08:51:45 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f0000000300)={r2, 0x6, &(0x7f0000000180)=[0x5, 0x6, 0x10001, 0x8000, 0x0, 0x0], &(0x7f00000001c0)=[0xd9, 0x4, 0x9, 0x3, 0x6], 0x10, 0x5, 0x1, &(0x7f0000000280)=[0x1ff, 0x0, 0x1, 0x0, 0x8], &(0x7f00000002c0)=[0x1, 0xfff, 0x92, 0x101, 0x3]}) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1d, 0x0, 0x0, 0x0, 0x5}}, 0x50) 08:51:45 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x19) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tables_matches\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x6, 0x4, 0x8000, 0x8, 0x0, 0xffffffffffffff80, 0x200, 0x7b1, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000140)=0x43) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) 08:51:45 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000000c0)={r1, 0xf5}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') sendfile(r0, r2, 0x0, 0x8000) 08:51:45 executing program 1: syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x3a, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) syz_emit_ethernet(0x132, &(0x7f0000000100)={@empty, @local, [{[{0x9100, 0x9ab7, 0x9, 0x3}], {0x8100, 0x9d, 0x1, 0x4}}], {@ipx={0x8137, {0xffff, 0x11c, 0x7fff, 0x15, {@broadcast, @random="71324794d23b", 0x10001}, {@broadcast, @current, 0x100}, "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"}}}}, 0x0) [ 118.455376][ T8277] Invalid argument reading file caps for ./file0 [ 118.472117][ T8279] Invalid argument reading file caps for ./file0 08:51:45 executing program 2: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x7}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x10, &(0x7f0000000540)=[@in={0x2, 0x4e21, @empty}]}, &(0x7f0000000400)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000440)={r1, 0x3, 0xeb21, 0x2, 0x1f, 0x7, 0x6, 0x3ff, {r2, @in6={{0xa, 0x4e22, 0x6, @ipv4={[], [], @multicast1}, 0xb0e}}, 0x9, 0xb0, 0x3f, 0x40, 0x6}}, &(0x7f0000000500)=0xb0) r3 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000280)=0x1) r4 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f00000000c0)=0x10, 0x80800) getsockopt$inet_opts(r4, 0x0, 0xd, &(0x7f0000000180)=""/255, &(0x7f0000000100)=0xff) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000080)=""/33, 0x200000d7}], 0x1) 08:51:45 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'veth1_to_team\x00', 0x200}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f00000000c0)) 08:51:45 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x10001, 0x200000) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) close(r1) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) 08:51:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x208000, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8765, 0x2000) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/207) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x14, 0x0, &(0x7f0000000200)=0xfffffe6e) 08:51:45 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, 0x0, &(0x7f0000000300)) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(r2) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10010000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=@newtaction={0x4e08, 0x30, 0x300, 0x70bd26, 0x25dfdbfd, {}, [{0x1f88, 0x1, @m_pedit={0x1f84, 0xf, {{0xc, 0x1, 'pedit\x00'}, {0x1eb0, 0x2, [@TCA_PEDIT_KEYS_EX={0x148, 0x5, [@TCA_PEDIT_KEY_EX={0x54, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}]}]}, @TCA_PEDIT_PARMS={0xeb0, 0x2, {{{0x40, 0x6, 0x20000000, 0x4, 0x7}, 0xb4, 0x80000000, [{0x101, 0x2fe, 0x1ff, 0x0, 0xfffffffffffffff8, 0x5}, {0x8, 0x9, 0xffff, 0xd0, 0xe77, 0x9}, {0x9, 0x5, 0x1, 0x8, 0x7f, 0xbf}, {0x5, 0x3, 0x433, 0x4384, 0x1, 0xffffffff}, {0xffffffffffffff7f, 0x6, 0x4, 0xabee, 0x6, 0xffffffff}, {0xfff, 0x0, 0xfffffffffffffff9, 0x2c2c00, 0x5, 0x2}]}, [{0x5, 0x7, 0x40, 0x3, 0x5dd, 0x401}, {0x7fffffff, 0xffffffff80000001, 0xffb, 0xa674, 0x8, 0xffffffff904ec144}, {0xff, 0x80000001, 0x7f, 0x6, 0x536}, {0x2, 0x100000, 0x200, 0x0, 0x0, 0xd7}, {0x4, 0x1ff, 0x7fffffff, 0x7f, 0x100000000, 0x8001}, {0x3, 0x400, 0x5, 0x1, 0xfffffffffffff801, 0x7fffffff}, {0x1f, 0x5, 0x1, 0xffff, 0x9, 0x80000000}, {0x1, 0xa1f4, 0x7, 0x8, 0x100000001, 0xd2c7}, {0x1, 0x200, 0x6, 0xb, 0x6, 0x8000}, {0x1, 0x7f, 0xffffe00000000000, 0xff, 0xffffffffffffffd8, 0x4}, {0x3, 0x7, 0xff, 0x100000001, 0x7, 0x1}, {0x800, 0x1, 0x5, 0x80, 0x3, 0x200}, {0x44, 0x6, 0x401, 0x10000, 0x9, 0xfffffffffffffff7}, {0x2a1e, 0xfffffffffffffff9, 0x9, 0x6, 0x8001, 0x5}, {0xffff, 0x5, 0x0, 0xfff, 0x5, 0x1}, {0x8c5e, 0x4, 0x4, 0x6, 0x9d, 0xae}, {0x6, 0x10000, 0x6, 0x3, 0x4, 0xfffffffffffffe00}, {0xffff, 0x568900d7, 0x4, 0x6ff65c88, 0xfff, 0x870}, {0xffffffff90a0fd0e, 0x2, 0x202d800, 0x9063, 0x4, 0x2}, {0x80000001, 0x7, 0x10001, 0xffffffffffff0000, 0x3, 0xdb}, {0x7, 0xd1, 0xed3, 0x5f1, 0x5, 0xc79}, {0x5, 0x2, 0x1, 0x100, 0xfff, 0xffffffffffffff80}, {0x2, 0x1f5, 0xffffffffffff7fff, 0x5, 0x9, 0x81}, {0x1f, 0x0, 0x6, 0x10000, 0x7, 0xffff}, {0x101, 0x4, 0x7, 0x6, 0x7f, 0x200}, {0x564, 0x8, 0x0, 0x9, 0x0, 0x401}, {0x7, 0xbe, 0x1ff0000000, 0x5, 0x9, 0x2}, {0xfffffffffffffffb, 0x2, 0xe2, 0x9, 0x1f, 0x40}, {0x87, 0x6f2, 0x6, 0x7, 0xfffffffffffffff7, 0x7}, {0x7, 0x668, 0xfffffffffffff6f6, 0x1f, 0x80, 0x4}, {0xce, 0x8, 0x6, 0x3, 0x8000, 0x1}, {0x1, 0x100000000, 0x9, 0x6298, 0x1, 0x8}, {0x7, 0xffffffffffffff37, 0x5b, 0x1, 0x9, 0x5}, {0x10001, 0x4, 0x3, 0x6, 0x7, 0x3}, {0x9, 0x101, 0x290, 0x8, 0x3ff, 0xfffffffffffffffe}, {0x1, 0x3ff, 0xfffffffffffffffa, 0xb51, 0x2, 0x2}, {0x0, 0x4, 0x4, 0x1, 0x7fffffff, 0x6}, {0x8, 0x4, 0x6, 0x8000, 0x1, 0xdbad}, {0x3, 0xffffffffffffff81, 0x0, 0x1, 0x2, 0x74fd9912}, {0x9, 0xffff, 0x9, 0x0, 0x5, 0xde}, {0x401, 0x8, 0x20, 0x10000, 0x0, 0x7}, {0x3, 0x3, 0x3, 0x7, 0x7}, {0x81, 0x7fff000000, 0x5, 0x101, 0x81, 0x3ff}, {0x5, 0x40, 0x8, 0x4, 0x800, 0x1}, {0x800, 0x1, 0x8, 0x5, 0x2, 0x2}, {0x2, 0x80000000, 0x1000, 0x8, 0x3, 0x4}, {0x9, 0xfffffffffffffffe, 0x7, 0x6, 0x4, 0x3}, {0x9, 0xc16, 0x7f, 0x100, 0x8, 0xc9}, {0x8, 0x8996, 0x9, 0x3, 0x9, 0x4}, {0x6, 0x1ff, 0x6a4, 0x0, 0x3, 0x101}, {0x8, 0x1e1a5a16, 0x101, 0x5, 0x9, 0x9}, {0x200, 0x7f, 0x7, 0x8b, 0x100000001, 0x20}, {0x4, 0x8, 0x0, 0x3, 0x1, 0x8001}, {0x466, 0xfffffffffffffc00, 0xfc1, 0xfffffffffffffffd, 0x5e2, 0x6}, {0x3, 0x4, 0xffffffff, 0x2, 0x7, 0x902}, {0x3bcc, 0x8, 0x7ff, 0x47, 0x7fffffff, 0x3}, {0x100000001, 0x5, 0x1, 0x3, 0x4, 0x7}, {0x0, 0x3ff, 0x5, 0x0, 0xfffffffffffffffb, 0x4}, {0x1, 0x5b53800000000000, 0x35d, 0x0, 0x5, 0xfffffffffffffff9}, {0x3ff, 0x2, 0x2, 0x2, 0x9, 0x5}, {0x3, 0x6, 0x4, 0x568f, 0x9, 0x9}, {0xf29, 0x505d, 0x0, 0x1, 0x1, 0x7f}, {0x7ff, 0x9, 0x1, 0x42, 0x8, 0x4}, {0x6, 0x7, 0x8, 0x2, 0x6, 0x3}, {0x4, 0x9, 0x0, 0x94c3, 0x8, 0x7015}, {0x3, 0x6, 0x1, 0xca5, 0x101, 0x8}, {0x5, 0x1f, 0x0, 0x2f1, 0x11, 0x80000000}, {0xd89, 0x8, 0xafa, 0x400, 0x9, 0x100000000}, {0xfff, 0x3, 0x3, 0x100, 0xe728, 0x5}, {0xa4d1, 0xcc5a, 0xd63, 0x3, 0x0, 0x8}, {0x2000000, 0xf24, 0x52de, 0x40, 0xd91, 0xffffffffffffffff}, {0x4, 0x20, 0x2, 0x3, 0x5, 0x10001}, {0x5, 0x8, 0x4, 0x101, 0x3, 0x8}, {0x7, 0x10000, 0x0, 0x7d4, 0x8, 0x1ba6}, {0x1, 0x4, 0xb7, 0x3, 0x1, 0x198000000000000}, {0xc1, 0x3, 0x6, 0x2, 0x5, 0x4}, {0xffffffffffffff01, 0x5, 0x6, 0x0, 0x5, 0x8}, {0x9, 0x6, 0x9, 0x5, 0xec62, 0xff}, {0xb836, 0x3ff, 0x0, 0x2, 0xbf, 0x6}, {0x1000, 0x3f, 0xdbf6, 0x4, 0x7, 0x10000}, {0x9, 0x2, 0x8, 0xd92, 0x39b8, 0x400}, {0x8, 0x6, 0x7, 0xffff, 0x6, 0x5}, {0x5, 0x9, 0xd5, 0x8, 0x800, 0x8001}, {0x100000001, 0x1f, 0x0, 0x7, 0x7f, 0x8}, {0xfffffffffffffffc, 0x7, 0x800, 0x5, 0x5, 0x3}, {0x6287, 0x8, 0x6, 0x3, 0x1ff, 0x101}, {0x9, 0x0, 0x0, 0xffffffff, 0x3f, 0x8}, {0xffffffff, 0x3, 0x542, 0x5, 0x6, 0xfff}, {0x3, 0x7fff, 0x5, 0x10000, 0x1, 0x1}, {0x1f, 0x0, 0x4, 0x4, 0x10001, 0x10001}, {0x7f, 0x8, 0xb660, 0x1, 0x800, 0x8}, {0x4, 0x3, 0x6, 0x6, 0x1, 0x6}, {0x7fffffff, 0x19a, 0x2, 0xd65b, 0x1, 0xffffffff}, {0x561, 0x400, 0xfff, 0x3, 0x1, 0xff}, {0x9, 0x1, 0xff, 0x75, 0x401, 0xffffffff}, {0x80000001, 0x9, 0x8, 0x80000001, 0x6, 0x5}, {0x10000, 0x7fff, 0x4, 0x1, 0x401, 0x6}, {0xfffffffffffffff8, 0x100000000, 0x1, 0x2, 0xffffffffffffa3b6}, {0x8, 0x2, 0x814, 0xbb437b6, 0x4, 0x8}, {0x3, 0xfff, 0x4, 0x101, 0x7ff, 0xe4a9}, {0xf6, 0x7, 0xfffffffffffffff9, 0x2, 0x800, 0x1000}, {0x10000, 0xa000000, 0x5, 0x0, 0x6, 0x2}, {0x7ff, 0x9, 0xff9, 0x13a3, 0x100000001, 0xfc2}, {0x2, 0xfffffffffffffffd, 0x60, 0x8000, 0x8001, 0x100}, {0x5, 0x0, 0x1000, 0x0, 0x81, 0x8}, {0x6, 0x9, 0x7, 0x2, 0x909, 0x100}, {0x4, 0x20, 0x0, 0x4, 0x3, 0x80000001}, {0xff, 0x8000, 0x80000000, 0x3f, 0x6, 0x6}, {0x800, 0x6, 0x40, 0x3, 0x800, 0xffffffff}, {0x2, 0x2, 0xdf4, 0xfff, 0x1, 0x7ff}, {0x9, 0x7f, 0x9, 0x8000000000000000, 0x9, 0x7}, {0x6, 0x6, 0x5, 0x3, 0x3, 0x7}, {0x1f, 0x31, 0x3, 0x4, 0x159c, 0x4}, {0x8, 0x4, 0xffff, 0x4, 0x3, 0x7fff}, {0x8001, 0x4163e88a, 0x4, 0xf4, 0x5, 0x5}, {0x4, 0x6c, 0x8, 0xff, 0x8000, 0x401}, {0x7, 0x3ff, 0x2, 0x6, 0x6, 0xd2}, {0x5, 0x3, 0x40, 0x9, 0x8000, 0x400}, {0x200, 0x7, 0x100000001, 0x4, 0xfffffffffffffe01, 0x5}, {0x0, 0x9, 0x49, 0xfffffffffffffffb, 0x3d72, 0x8}, {0x9, 0x7, 0x7, 0x7, 0x7, 0x3}, {0xc3f7, 0x1, 0x5, 0x3ff, 0x200, 0x1}, {0x40, 0xb1f8, 0x1, 0x6, 0x100000001, 0x9}, {0x3, 0x5, 0x20, 0x1, 0x3, 0x1}, {0x2, 0x1, 0xffff, 0x8, 0xfffffffffffffffc, 0xd}, {0x6, 0x2, 0x10000, 0x2, 0x6, 0xe}, {0x1000, 0x9, 0x6, 0x9, 0x3ff, 0xffffffffffff90e9}, {0x7fffffff, 0x8000, 0x0, 0x7, 0x81, 0x2}], [{0x5, 0x1}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x4}, {0x5}, {0x4}, {0x7, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {0x1}, {0x3}, {0x5, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x4}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x3}, {0x3, 0x1}, {}, {0x7}, {}, {0x2}, {0x4}, {0x1, 0x1}, {0x1}, {0x0, 0x1}, {0x5}, {0x7}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x7, 0x1}, {}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x5, 0x1}, {0x4, 0x1}, {0x4}, {0x5}, {0x3}, {0x2, 0x1}, {0x5}, {0x0, 0xfe52ef1d5cee0695}, {0x0, 0x1}, {0x7}, {0x1}, {0x7}, {0x1, 0x1}, {}, {0x5}, {0x5, 0x1}, {0x7}, {0x4, 0xc0a1cb95989b7073}, {0x7}, {0x0, 0x1}, {0x7}, {0x7}, {0x5}, {0x7}, {0x7, 0x1}, {0x7, 0x1}, {}, {0x7}, {}, {0x2, 0x1}, {0x5, 0x1}, {0x1}, {0x5}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x5}, {0x5}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x7}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x3}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x1}, {0x7, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x3}, {0x7}, {0x2, 0x1}, {0x4}, {0x5, 0x1}, {}, {}, {}, {0x3}, {0x5, 0x1}, {0x5}, {0x0, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x94, 0x5, [@TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}]}, @TCA_PEDIT_KEY_EX={0x3c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x1c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0x2c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x8, 0x101, 0x5, 0x5942, 0x10000}, 0x7, 0x400}, [{0x5, 0x4, 0x5, 0x0, 0x7, 0x3}, {0x9, 0x100000000, 0x20, 0x101, 0x3, 0x32}, {0xa61, 0x0, 0x8, 0x100000000, 0x509}, {0x1, 0x100000001, 0xafb, 0x101, 0xffffffffffffffe1, 0x8}, {0xfd31, 0x9, 0x1, 0x0, 0x5166, 0x3}, {0x5, 0x7f, 0x8, 0x8, 0x5, 0x80000001}, {0x959b, 0x2, 0x81, 0x200, 0x9, 0x7ff}, {0x80000000, 0x0, 0x7, 0x9, 0x4, 0xf4f5}, {0x20, 0x20, 0x0, 0x8, 0x800, 0x80}, {0x5, 0x8, 0x4d22, 0x5295d1bf, 0x0, 0x2}, {0x8c3, 0xc17, 0x10001, 0x8001, 0x8, 0x2}, {0x5, 0xdce, 0xffff, 0x4, 0x9, 0x8000}, {0x10001, 0x58, 0x0, 0x3, 0x1, 0x8000}, {0x3, 0x40, 0xd, 0x6, 0x7fff, 0x3}, {0x1, 0x44, 0x100000001, 0x400000000000000, 0x7, 0xfff}, {0x6, 0x7, 0x878, 0x9, 0x2, 0x80}, {0x5, 0x5, 0x7, 0x3, 0xc3, 0x226}, {0x4c, 0x2, 0x3f, 0x1, 0x3262, 0xba68}, {0xa7, 0x3, 0x17c, 0x2, 0x331, 0x8}, {0x1, 0x7fff, 0x81, 0x40, 0x4, 0x401}, {0x7fff, 0x0, 0x7fff, 0x100eb9cd, 0x0, 0x46c}, {0x3ff, 0xff, 0xfffffffffffffffb, 0x4, 0x400}, {0x100000000, 0x0, 0x0, 0x9, 0x9, 0x6}, {0x1ff, 0x8, 0x5, 0x8, 0x5, 0x6fa8}, {0x400, 0x2f5, 0x1f, 0x7, 0x100000001, 0x9}, {0x0, 0x8, 0x7f, 0x0, 0x40, 0x1}, {0x1, 0xfffffffffffffffd, 0x9, 0x3, 0x100000000, 0x800}, {0x8708, 0x6, 0x101, 0x1, 0x30cbad20, 0x1}, {0x2, 0x6, 0x400, 0x5, 0x949, 0x3d7}, {0x5, 0x6, 0x4, 0x6, 0x4dc8, 0x20}, {0x6, 0x4, 0x81, 0x5, 0x3, 0x6198dcf3}, {0x7, 0x0, 0x100000001, 0x200, 0x7, 0x7}, {0x0, 0x7, 0x9, 0x100000000, 0x0, 0x9}, {0x4, 0xc8c4, 0x0, 0x1f, 0xe57, 0x40}, {0x100000001, 0xa8, 0x3, 0x7fff, 0x5}, {0x0, 0x10000, 0x2, 0xe35, 0x8, 0x81}, {0x8, 0x9ec5, 0x8, 0x100000000, 0x4, 0x100000000}, {0x5, 0x2, 0x2, 0x68, 0x18, 0x954}, {0x100000001, 0xfff, 0x0, 0x0, 0xffffffffffff7fff, 0x6}, {0xf8, 0x6, 0x401, 0x4, 0x2, 0x5}, {0x2, 0x8, 0x7, 0x82, 0x440cec71, 0x7}, {0x2, 0x9, 0x1f, 0x4, 0x0, 0x1}, {0x1, 0x80000001, 0x5, 0x6, 0x81, 0x5f}, {0x100000001, 0x0, 0x401, 0x7fffffff, 0x1000, 0x3a7f}, {0x4, 0x8, 0x4, 0x8, 0x2, 0xdc4e}, {0x2, 0x0, 0x100000001, 0x100000000, 0x0, 0x7}, {0x77, 0x2378, 0x6, 0x5, 0x2594, 0x3f}, {0x1ff, 0x9, 0x3, 0x7, 0x9, 0x3}, {0x52, 0x2, 0x8, 0x2, 0x6, 0x7}, {0x7ff, 0x1, 0xa79, 0x8, 0x7, 0x6}, {0xffffffff, 0xaf5, 0xfffffffffffffff7, 0x10000, 0x7fffffff, 0x5}, {0xc2a, 0x5, 0x5639, 0x4, 0x3, 0x3}, {0x0, 0x4, 0x10000, 0x46, 0x9, 0x8000}, {0xd8b1, 0x8f, 0xffffffff80000000, 0x9, 0x5, 0x1}, {0x9, 0x5, 0x0, 0x4, 0x3, 0x7}, {0x2, 0x3, 0x1, 0x7, 0xa6, 0x866}, {0x4, 0x0, 0x4, 0x3, 0x4, 0x2}, {0x8, 0x101, 0x9, 0x0, 0x0, 0x1}, {0x3, 0x1, 0xb27, 0x80, 0x4, 0x2}, {0x0, 0x2, 0x75, 0x0, 0x4, 0x3}, {0x9, 0xd89, 0xfff, 0x81, 0x7fffffff, 0xfffffffffffffffd}, {0xfffffffffffffffa, 0x3, 0x1, 0x9, 0x2, 0xcc6a}, {0x9390, 0x4, 0x7fff, 0x4, 0x1000, 0x80}, {0x2, 0x1b5, 0x0, 0x4, 0x2, 0x208}, {0x5, 0x6, 0x6c, 0x7, 0x9, 0x5}, {0x4, 0xffffffff, 0xdab2, 0x1000, 0x5, 0x3010}, {0x7, 0x4, 0xff, 0x8, 0xffffffffffffffff, 0x2}, {0xff, 0x6, 0x8001, 0x0, 0x80, 0x8872}, {0x2, 0x6, 0x5, 0x6, 0x100, 0x8001}, {0x40, 0x6, 0x8, 0x40, 0x3, 0x3}, {0x1, 0x6d, 0x7fff, 0x8, 0x2, 0xffffffffffffffc1}, {0x1, 0x2, 0x8, 0xca0, 0x7, 0x8}, {0xe27, 0x6, 0x9, 0x1, 0x0, 0x401}, {0x10001, 0x80, 0xfffffffffffffc36, 0x9, 0x7, 0x8}, {0x0, 0x7, 0x100000000, 0x7, 0x80000001, 0x1}, {0x7, 0x1, 0x3, 0x61f, 0x3196, 0x4}, {0x2, 0x639, 0x4, 0x80000000, 0x6, 0x6}, {0xfffffffffffffff8, 0x5, 0x0, 0x1f, 0x0, 0x18}, {0x0, 0x7, 0x10000, 0x4, 0x2, 0x46}, {0x5, 0x8001, 0x9, 0xff, 0xffffffff, 0x8}, {0x8, 0x1f, 0x400, 0x3ff, 0x5, 0x90e}, {0x1, 0xfffffffffe0ecac9, 0x200, 0x401, 0xffff, 0x80000001}, {0x7f, 0x6, 0x80, 0xfff, 0x6, 0xfff}, {0x5, 0x401, 0xfff, 0x2, 0x1ff, 0x5}, {0x81, 0x1, 0x6, 0x1, 0x0, 0x9}, {0x1, 0x1f, 0x6, 0x4, 0x0, 0x9}, {0xbfc5, 0x10001, 0x5, 0xe0a, 0x9d0000000}, {0xd1c3, 0x10000, 0xf2, 0x1, 0x100000001, 0x9}, {0x3, 0x5, 0x3761, 0x6, 0x1, 0x80000001}, {0x6c9, 0x5, 0x9, 0xa4, 0x3}, {0x5, 0x1ff, 0x8, 0x3, 0x101, 0xfffffffffffffff9}, {0x706, 0x0, 0x477e5a75, 0x3f, 0x80000001, 0x7ff}, {0x9d40, 0x7, 0x4, 0x4, 0x401, 0x1}, {0x9, 0x74b, 0x8001, 0x800, 0x3, 0x7}, {0xfc6, 0x40004000, 0x4, 0xffff, 0xfffffffffffffffc, 0x37bc}, {0x35, 0x400, 0xffff, 0x4, 0x800, 0x4}, {0xb7, 0x65e, 0x7fffffff, 0x10000, 0x4}, {0xfffffffffffffffd, 0x3, 0x1, 0x0, 0x8, 0x4}, {0x9bd0, 0x20, 0x6, 0x6, 0x20000000000000, 0x7fffffff}, {0xffffffffffff7fff, 0x2, 0xffff, 0x8, 0x3b51, 0x400}, {0x2, 0x6, 0xfff, 0x7, 0xffffffff, 0x8}, {0x4, 0x1f, 0x799, 0x9, 0x1, 0x3ff}, {0x4, 0xfffffffffffffffa, 0xffffffffffffff0e, 0x5d28, 0x9}, {0x3, 0x3, 0x5, 0x0, 0x7fff, 0x1000}, {0xb6a9, 0x9, 0x2, 0x8, 0x9, 0x7}, {0x9, 0x93a, 0x4, 0x5, 0x10001, 0x7}, {0x4, 0x80000000, 0x0, 0x100000000, 0x3, 0x5}, {0x1, 0x3ff, 0x6, 0xffffffff, 0xf7fd}, {0x2, 0x2db6, 0x2, 0x2, 0x0, 0x6}, {0x3ff, 0xb6, 0x7, 0x80000000, 0x7, 0x3e5a935f}, {0x8, 0x4, 0x4, 0x6, 0x7f4f, 0x5}, {0x4, 0x5, 0x3, 0x8, 0x8, 0xffffffff7fffffff}, {0x20, 0x6a89, 0x3, 0xfffffffffffffe00, 0x401, 0x5}, {0x4, 0xfff, 0xe0, 0x81, 0x3, 0x9}, {0x8, 0x3, 0xf69, 0x6, 0x0, 0xd1}, {0x5, 0x3ff, 0x6ac, 0x2, 0x7ff, 0x7}, {0x1, 0xce8e, 0x7, 0x0, 0x7, 0xfffffffffffffffd}, {0x6e57, 0xcaa, 0x4, 0x4, 0x7, 0x3}, {0x8000, 0x5, 0x7, 0x7ff, 0x8001, 0xfff}, {0x3, 0x4, 0x78a, 0x200, 0x40800000, 0x3}, {0x5, 0x6c9, 0x40, 0x80, 0xfffffffffffffffd, 0x80000000}, {0x8, 0x1, 0x8, 0x8, 0xdd, 0x7}, {0x2, 0xc0, 0x2, 0x7fffffff, 0x7}, {0xc9ce, 0x2, 0x7, 0xffffffff, 0x2, 0x3}, {0x9, 0xf4, 0x7, 0x200, 0x9, 0x5}, {0x9964, 0x2, 0x100, 0xffffffff, 0x7, 0x2}, {0x3, 0x7, 0x4, 0x0, 0x83}, {0x9cba, 0x100000000, 0x5, 0x9, 0x6, 0x6}], [{0x5}, {0x0, 0x1}, {0x3}, {0x4}, {0x2, 0x1}, {0x2, 0x1}, {0x4}, {0x7, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {}, {0x2}, {0x0, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0x29b49265e53ff339}, {0x7, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5}, {0x5, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {}, {0x5}, {0x2, 0x1}, {0x3, 0x1}, {0x5}, {}, {0x7}, {0x5}, {0x6}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x1}, {0x2}, {0x0, 0x1}, {0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x2, 0x1}, {}, {0x2}, {0x5}, {0x7}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x3}, {0x2}, {0x7, 0x1}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x4, 0x1}, {0x1}, {}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3}, {0x3}, {0x7}, {0x3}, {0xbafe79829641ffff}, {0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x7}, {0x5}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x7}, {0x5}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x7, 0x1}], 0x1}}]}, {0xc0, 0x6, "ed7b0dc0acd8dae804073c193ce70a8c816802617a39fdc7fb0e0ed7cf03470505da3f1bcd2d5c2a35b719721e171cf1cfe2c377ea2e7654088f7e2e2b54324c77db8262527caac213b870d7a847eae7027b42c2417be2ec4b3d099f00a786b12c3f770105e31429a4ec6e31de2537f87a43da46b6a2b4cd1cc11212fb206d2b7137c88d9afbf7e0bf9f1ceea1701ba25223cdd35446272be13cfe5acfba20f830fb2d564f790a527c5e3d842a7e3f413ea64a1838f3323491007382"}}}}, {0x2e6c, 0x1, @m_pedit={0x2e68, 0x3, {{0xc, 0x1, 'pedit\x00'}, {0x2dd4, 0x2, [@TCA_PEDIT_KEYS_EX={0x1a0, 0x5, [@TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}]}, @TCA_PEDIT_KEY_EX={0x4}, @TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7b1fde776f2fb7df}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}]}, @TCA_PEDIT_PARMS={0xe98, 0x2, {{{0x200, 0x2, 0x0, 0x1, 0x8}, 0x7, 0x10001, [{0xffffffffffffff80, 0x4, 0x6, 0x3fff8000000, 0x6, 0x2}, {0x7fffffff, 0x8, 0x9, 0x7, 0xff, 0x1}, {0x3, 0x4, 0xc79, 0x4, 0x708, 0x2b}, {0x5, 0x1, 0xffffffffaf919d67, 0x7d46, 0x10001, 0x640}, {0x3, 0xa26a, 0xd5, 0x5, 0xbc, 0xa4a7}]}, [{0x7, 0x80000001, 0x0, 0x1, 0x7, 0x100000000}, {0x0, 0x5, 0x1, 0x4, 0x8, 0x304}, {0x5, 0x6, 0x3, 0xffff, 0x664, 0x8}, {0xfffffffffffffff7, 0x5, 0x0, 0x8001, 0x10001, 0x101}, {0x2, 0x200, 0x3, 0x5, 0x100, 0x7f}, {0x7fffffff, 0x80000000, 0x4, 0x1f, 0x8001, 0x4}, {0x2, 0x0, 0x320, 0x6, 0x0, 0x3f}, {0x80000001, 0x7fffffff, 0x3, 0x4, 0x5, 0x7f}, {0x8, 0x56a, 0x4, 0x6006, 0x4, 0x5}, {0xfffffffffffffeff, 0xa9bf, 0x9, 0x1, 0x4, 0x8001}, {0x2dc3, 0x1, 0x2, 0x964, 0x2, 0x6}, {0x32fd, 0x24000, 0x0, 0x6, 0x100}, {0x3, 0x67d, 0x399000000000000, 0x5, 0x400, 0x89b}, {0x0, 0x8, 0x200, 0x9, 0x1, 0x44}, {0x7495, 0x5, 0x6, 0x6, 0x0, 0x7}, {0x6, 0x9, 0x100, 0x101, 0x2, 0xfffffffffffff000}, {0x1, 0x4, 0x331, 0x1, 0xffffffffffffffc1, 0x1000}, {0x8, 0xbea, 0x100000001, 0x7, 0x70, 0x8}, {0x2, 0x7f, 0x8000, 0x0, 0x800, 0x9}, {0x1ff, 0x7fffffff, 0x8, 0xfffffffffffffff9, 0x9, 0xd5}, {0x82b4, 0xef, 0x100000001, 0xffff, 0x20, 0xfffffffffffffffb}, {0x7, 0x0, 0x400, 0x2, 0x8, 0x15}, {0x400, 0x6, 0xe392, 0x6, 0x1, 0xc8}, {0xba0, 0x80, 0x9a7, 0x8, 0x5}, {0x800, 0x6, 0x3, 0x7fffffff, 0x5, 0xffff}, {0x1, 0xa3, 0x3, 0x3ff, 0x3, 0x8}, {0x1, 0x1, 0x0, 0x5, 0x8, 0x660}, {0x1f, 0x6, 0x1, 0x81, 0xed7, 0x10001}, {0x2, 0x100, 0x6, 0x6, 0x7, 0x80}, {0x8000, 0x210b7337, 0x8, 0x10000, 0x4, 0x5}, {0x0, 0x3, 0xc59b, 0x5e, 0x4, 0xfffffffffffffff7}, {0x1000, 0x101, 0x4494, 0x4, 0x10000, 0x61}, {0x100000000, 0x0, 0x5, 0x100000000, 0x80000000, 0x80000001}, {0x8, 0xffff, 0x8000, 0x3, 0x10001, 0xfffffffffffffffc}, {0x8001, 0xff, 0x0, 0x9, 0xca4a, 0x600000000000000}, {0x1, 0x9a16662, 0x80, 0x59e7, 0x1, 0x8}, {0x1, 0x8, 0x0, 0x80000000, 0x1af, 0x80000001}, {0x8, 0x2, 0xffb8, 0x8, 0x1, 0x1}, {0x1, 0x7f, 0xb42a, 0x1, 0xc87, 0xfff}, {0x5, 0x3, 0xffffffff, 0x8, 0x1e1}, {0x3, 0x9, 0xcfd, 0x30a2d68d, 0x7, 0x7}, {0x10001, 0x5, 0x9, 0x1, 0x5, 0x7f}, {0x1, 0x3, 0x3, 0x0, 0x8001, 0x2}, {0x6, 0x20, 0xfffffffffffffbff, 0x7, 0x2, 0xffff}, {0x5, 0x8, 0xf82, 0x3, 0x8}, {0x9, 0x5, 0x7, 0x8000, 0x5, 0x4}, {0x99, 0x5, 0x1f, 0x2, 0x4, 0x7}, {0x5c1, 0xfffffffffffff476, 0xb9, 0x6, 0x40, 0x4e07}, {0x4, 0x100000000, 0x80000001, 0x5, 0x2, 0xfffffffffffffeff}, {0x635, 0x9, 0x1, 0xd6cd, 0x0, 0x401}, {0xffff, 0x3, 0x0, 0x3, 0x8, 0x9}, {0x3, 0x7fffffff, 0x8001, 0x3ff, 0xb4, 0x1}, {0x1f, 0x2, 0xdb, 0x8000, 0x4c, 0x4}, {0x1ff, 0x7, 0x2, 0x7, 0x8, 0x5ab800}, {0x5, 0x10000, 0x1, 0x2, 0x139, 0x5}, {0x7fffffff, 0x99, 0x20, 0x42, 0x10001, 0x8000}, {0x4ba9d14e, 0x7, 0x10001, 0x1, 0x7, 0x9}, {0x8, 0x472852f3, 0x81, 0x1f, 0xffff, 0x8}, {0x4, 0x6, 0x1, 0xf8cb, 0x20, 0x6}, {0x0, 0x4, 0x0, 0x4, 0x6, 0x7fffffff}, {0xffffffffffffffff, 0x0, 0x9, 0x1, 0x5, 0x2b2d48f6}, {0x5, 0x7, 0x3, 0x97a, 0x2, 0x6a}, {0x7, 0x100, 0xcc, 0x1, 0x40, 0x4}, {0x1, 0x20, 0x0, 0x2, 0xffffffffffffffff, 0x4}, {0x1f, 0xc9b0, 0x10001, 0xa8, 0x4, 0x1f}, {0xffffffffffffffff, 0x2, 0x3, 0x3, 0x4, 0x8}, {0x1, 0xfffffffffffffff8, 0xa1, 0x6, 0x2, 0x2}, {0x200, 0x0, 0x5, 0x1f, 0x0, 0x3f}, {0x1f, 0x0, 0x3, 0x40, 0x2, 0x7}, {0x20, 0x200, 0x9, 0xfffffffffffffffe, 0x9, 0xfffffffffffffff8}, {0x7ff, 0x9048, 0x8, 0x8, 0x7, 0x5}, {0x2, 0x594f5d25, 0x1f, 0x80000001, 0x1297af2b, 0xffffffff}, {0x2, 0x2a0, 0xe5, 0x4, 0x9}, {0x1, 0x412f, 0x0, 0xa9fa, 0x0, 0xfffffffffffffffb}, {0x4, 0x8, 0x54f1, 0x100000000, 0x8, 0x5}, {0x0, 0x8, 0x4, 0x80000001, 0x8, 0x5}, {0x0, 0x8, 0x6, 0x4, 0xfffffffffffffff7, 0x5}, {0x2, 0x8, 0x3ff, 0x800, 0x7, 0x7ff}, {0x0, 0x8000, 0x9, 0x4, 0xdd8, 0x100}, {0x7, 0x211d, 0xaf, 0x1, 0xad3, 0x7}, {0x4, 0x5, 0x1, 0x5, 0x7fff, 0x80000001}, {0x4, 0x0, 0x2, 0xed, 0x1, 0x7ea}, {0x7fff, 0x400, 0x3, 0x1, 0x1, 0x1f}, {0x40, 0x9, 0x65105166, 0x8000, 0x7ff, 0x1}, {0x3, 0x7f, 0x2, 0x1, 0x1, 0x9}, {0x8, 0x3, 0x2, 0x1, 0x4e1, 0x7fff}, {0x80000001, 0x400000, 0x0, 0x4, 0xf95}, {0x92cb, 0xffffffff00000001, 0x8, 0x0, 0x0, 0xce}, {0x8, 0x9, 0x4, 0x40e, 0x2, 0x6}, {0x2, 0xffffffffffffff01, 0x4, 0x0, 0xfff, 0x2ce}, {0x1ff, 0x8, 0x9, 0x4, 0x2}, {0x4, 0x9, 0x7, 0x40, 0x6, 0x7}, {0xfffffffffffffffa, 0x9, 0xffffffff, 0x6, 0x100, 0xdfb0}, {0x6f, 0x3, 0x1ff, 0x9, 0x7, 0x1f}, {0xd5c, 0x3f, 0x0, 0x7, 0x9, 0x100000000}, {0xfffffffffffff493, 0xffffffff80000001, 0x4b, 0x8, 0x7a3, 0x3ecf87ff}, {0x0, 0x200, 0x6, 0x9, 0x1, 0x5}, {0xd8, 0x9, 0x8000, 0x5, 0x5, 0x2}, {0xffff, 0x0, 0x401, 0xff, 0xfff, 0x3f5}, {0x4, 0x0, 0x7, 0x0, 0x7fff, 0x5443}, {0xf0c, 0x80000001, 0x3f, 0x3f, 0x80000000, 0x56e8}, {0x8cc6, 0x1ff, 0x10000, 0x75, 0x400, 0x3}, {0x9, 0x6, 0x800, 0x7, 0x81, 0xc1}, {0x20, 0xffffffff, 0x800, 0x5, 0x8, 0x7fff}, {0x8, 0x9, 0x8001, 0xef, 0x5, 0x107}, {0x0, 0xfff, 0x9f21, 0x7, 0x6, 0xfffffffffffffffc}, {0x7, 0xfffffffffffffffc, 0x4, 0x534, 0x5, 0x400}, {0x7, 0x6, 0x2, 0x1f, 0x4, 0x7}, {0x9e62, 0x101, 0x9, 0x5, 0x1f, 0x9}, {0x4, 0x5, 0x10000, 0x400, 0x7, 0x1}, {0x5, 0x0, 0x8, 0x2, 0x81, 0xffffffffffffff81}, {0x3, 0x8, 0x9, 0x5, 0x3, 0x7}, {0x8, 0x3, 0x3, 0x20, 0xfffffffffffff800, 0xfffffffffffffffd}, {0x8, 0xd3, 0x9a0a, 0x2, 0x4, 0x8}, {0xfff, 0x4, 0xfffffffffffffffa, 0x6a, 0x7fffffff, 0x5}, {0x5, 0x2, 0x6, 0x7ff, 0x842, 0x7}, {0x8, 0x8, 0x9, 0x100, 0x2c4d40de, 0x8}, {0x81000000, 0x5, 0xfff, 0x80, 0x4}, {0x7, 0x4000000000, 0x0, 0x0, 0x2, 0xfc5}, {0x8, 0x1000, 0x4, 0x2, 0x331000, 0x5}, {0x0, 0x5, 0xff, 0x10001, 0xff, 0x9}, {0x9, 0x0, 0x1, 0x7, 0x4, 0x3f}, {0x3, 0x8, 0xc93, 0x80000000, 0x10000, 0x3}, {0x9, 0xae8a, 0x4, 0x3f3af634, 0x46, 0x1}, {0x7, 0xfff, 0x5, 0x4, 0x401, 0x1ff}, {0x20, 0xffff, 0x8e, 0x3, 0x4, 0xb046}, {0x8, 0x0, 0x0, 0x8, 0x6561, 0x86f5cec}, {0x8, 0x5, 0x3, 0x8001, 0xffff, 0x3}], [{0x1, 0x1}, {0x4}, {0x2, 0x1}, {0x7}, {0x3}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x7}, {0x3, 0x1}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {}, {0x3}, {0x7}, {0x7}, {0x7}, {0x7, 0x1}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x5}, {0x4}, {0x3, 0x1}, {}, {0x5}, {}, {}, {0x5, 0x1}, {0x7}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x2}, {0x4}, {0x5}, {0x3, 0x1}, {}, {0x5}, {0x0, 0x1}, {0x3, 0x1}, {0x7}, {0x5, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x7}, {0x3}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x5, 0x1}, {0x4}, {0x7}, {0x1}, {0x3, 0x1}, {0x6, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x3}, {0x2, 0x1}, {0x7}, {0x0, 0x1}, {0x7, 0x1}, {0x4}, {0x6}, {0x7, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3}, {0x7, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x2, 0x785e6a65192fb088}, {0x7, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0xf944b90b5e59b565}, {0x1}, {}, {0x7, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x4}, {0x4, 0x1}, {0x5}, {0x2, 0x1}, {0x3}, {0x5}, {0x2}, {0x4}, {0x5}, {0x5}, {0x5}]}}, @TCA_PEDIT_PARMS={0xe20, 0x2, {{{0xfffffffffffffff8, 0x80000001, 0x10000000, 0x3b6, 0x400}, 0xef0, 0xe64}, [{0x5, 0x7, 0x9, 0x1, 0x2, 0x3}, {0x7, 0x2, 0x3, 0x5, 0x6, 0x1}, {0x7, 0x8000, 0x8, 0x5, 0x536, 0x8}, {0xffffffffffffca37, 0x2, 0x1, 0x2, 0x9, 0x3}, {0x8001, 0x9, 0xffff, 0x7, 0x5, 0x100000001}, {0x8, 0x82, 0x6, 0xfbe, 0x80000001, 0x7f}, {0xfffffffffffffffb, 0x7ff, 0x0, 0x7f1, 0x5, 0x4}, {0x0, 0xdd, 0x7, 0x40, 0x3, 0x7fff}, {0x8589, 0x1, 0xda5, 0x7, 0xfffffffffffffffe}, {0x0, 0x4, 0x59, 0x200, 0x2, 0x4}, {0xde6, 0x3, 0x5, 0x8, 0x100, 0x8}, {0x9, 0x7, 0x8, 0x9, 0x630, 0x620abe95}, {0x9, 0xeef, 0x10000, 0x6, 0x7}, {0x5, 0x7f, 0x80000000, 0x7, 0x9, 0x10001}, {0x9, 0x81, 0x2, 0x8, 0x250, 0x5}, {0x1, 0x4, 0x0, 0x0, 0xa, 0xff}, {0x2, 0x1, 0xffffffff, 0x1, 0x1, 0x9}, {0x9, 0x401, 0x4, 0x0, 0x40, 0x4}, {0xfff, 0x100000001, 0x401, 0x6fe5, 0x7f, 0x2}, {0x7, 0x4, 0x7, 0x100000000000000, 0x40, 0x7fffffff}, {0x94bc, 0x5, 0x9, 0x4, 0x3}, {0x8, 0x1f, 0x7, 0xd32e, 0x7, 0x3}, {0xc07, 0x8, 0x45acff26, 0x3, 0x10001, 0x80000000}, {0xe5, 0x9b, 0x5, 0x8001, 0x10001, 0x6}, {0x10001, 0x3, 0x4, 0x3, 0x6, 0x9}, {0xe2, 0xccb4, 0x7, 0x48b, 0x7, 0x4}, {0x9, 0xf50, 0x7, 0x1, 0x9, 0x200}, {0x100000000, 0x6, 0xed78, 0x80, 0x1, 0x9}, {0x3, 0xfffffffffffffff8, 0x1, 0x2, 0x6, 0x6}, {0x1, 0x0, 0x5, 0x6, 0xf26d, 0x5}, {0x9, 0x8, 0x0, 0x1ff, 0x101, 0xd}, {0x8, 0x8, 0x10000, 0x3, 0x400, 0x584}, {0x1000000000000000, 0xfffffffffffffffa, 0x2, 0x5, 0x6, 0x3ff}, {0xffffffffffffffc1, 0x400000000000000, 0x3, 0x0, 0xe1bd, 0x7ff}, {0xffffffff, 0x9d9, 0x6c0, 0x1, 0x9, 0xffffffff}, {0x6, 0x200, 0x8000000000000000, 0x2, 0x84}, {0x0, 0x101, 0x8, 0x9, 0xffffffff, 0x4}, {0x3ff, 0xc4, 0x64, 0x3, 0x400, 0x8}, {0x1f, 0xde70, 0x1f, 0x7f, 0x2, 0x4}, {0x1, 0x16, 0x9, 0x6, 0x7f, 0x7}, {0x3ff, 0x0, 0x7, 0x3, 0xffff, 0x5}, {0x33, 0x3, 0xfffffffffffffff9, 0x1}, {0x9, 0x3, 0x8, 0xffffffff, 0x3, 0x2}, {0x5, 0x4cfa, 0x38, 0x3f, 0x5ae8, 0x5}, {0x80000001, 0xfffffffffffffff8, 0x9, 0xfff, 0xfffffffffffffff7, 0x1}, {0x8, 0x10001, 0x400, 0x101, 0x2, 0x5}, {0xcac1, 0x5, 0x9, 0x6, 0x7, 0x5}, {0x6, 0x5, 0x3ff, 0x80000000, 0x10001, 0x1ff}, {0x93, 0x1000, 0x2, 0x7, 0x2, 0xffffffffffff3322}, {0x8, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffc01}, {0x0, 0x8001, 0x10001, 0x9, 0x8, 0x6}, {0x3, 0x4, 0x7, 0x3, 0x8, 0x7fff}, {0x3892891f, 0x4, 0x28ae, 0x401, 0x1, 0x9}, {0x0, 0x3, 0x63, 0x5, 0x0, 0x5}, {0x9, 0x20, 0x80000000, 0x7fff, 0x3f, 0x8000}, {0x40, 0x400, 0x71d74118, 0x2, 0x3, 0x6}, {0x6, 0xf5, 0x1, 0xfffffffffffffff8, 0x1f, 0x8001}, {0x0, 0x5, 0x0, 0xe496, 0x8, 0x200000000}, {0xffff, 0x100, 0x81, 0x100, 0x4, 0x7}, {0x69, 0xfffffffffffff000, 0x5, 0x194, 0x5, 0xd86}, {0xa50b, 0x1, 0x0, 0x2, 0x4, 0x9}, {0x0, 0x3, 0xfffffffffffffff8, 0x100000001, 0x1, 0x7}, {0x9, 0x80000001, 0xfffffffffffff6a4, 0x5ea5ba32, 0x1, 0xfffffffffffffbff}, {0xc44, 0xffffffff, 0x5f0bde0, 0x8000, 0x0, 0x80000000}, {0x5, 0xfff, 0xf47, 0x7ff, 0x7, 0x40}, {0x6, 0x571, 0x1000, 0x3f, 0x4}, {0x1000, 0x80000001, 0x5, 0x6, 0x3, 0x7}, {0x7, 0xfffffffffffffffc, 0x8, 0x20e, 0x5, 0x9}, {0x0, 0x4, 0x9, 0x8001, 0x0, 0xfffffffffffffffe}, {0x5, 0x1000, 0x1, 0x100000001, 0x2800000000, 0x40}, {0x80000001, 0x3, 0x48, 0x3, 0x7, 0x21cf}, {0x1, 0x6, 0x80000000, 0x3, 0x7f, 0x2}, {0x6, 0x7, 0x6fd98ac1, 0x5, 0x101, 0x1}, {0x0, 0x4b, 0x1f0b, 0xfffffffffffffda7, 0x200, 0x3f}, {0x8, 0x1f, 0x2, 0x34, 0x1f, 0x1000}, {0x4, 0x8001, 0x1f, 0x3, 0x3ff, 0x1}, {0x8000, 0x100000000, 0xfffffffffffffffe, 0x2, 0x3, 0x1}, {0x0, 0x40, 0x20, 0x9, 0x7, 0x3ff}, {0x1, 0x7, 0x6, 0x0, 0x2, 0xfffffffffffffff7}, {0xeacf, 0x40, 0x3, 0xff, 0x0, 0x6}, {0xbe, 0x1, 0x185d, 0x4be, 0x8, 0x7fffffff}, {0x3, 0xdeb, 0xffffffffffff543a, 0x5, 0x4, 0x9}, {0xa87f, 0x83, 0xaff, 0x0, 0x9783, 0x1f}, {0x401, 0x81, 0x8, 0x7ff, 0x2e8b, 0x3}, {0x714, 0x3, 0x3, 0x100000000, 0x8, 0xc96}, {0xc58f, 0x800, 0x3, 0x5, 0x2, 0x1}, {0xffffffff, 0x1, 0x100, 0x7, 0x1ff80000, 0xfffffffffffffffc}, {0x20, 0x7, 0x0, 0x6, 0x3, 0x3f}, {0x8, 0xb8, 0x800, 0x7, 0xfff, 0x8001}, {0x80000000, 0x7, 0xffffffff00000000, 0x5, 0x4, 0x4}, {0x4, 0x3, 0x8000, 0xd9, 0x5, 0x4}, {0xffffffffffff81d4, 0x400, 0xf3b5, 0x0, 0x10000, 0x1}, {0x17, 0x61b3, 0x20, 0x2800000000, 0x82e, 0x101}, {0x4, 0x7, 0x6e0c, 0x7fff, 0x7, 0x8}, {0x9, 0x100000000, 0x200, 0x3ff, 0x80000001, 0x2}, {0x4, 0x0, 0x1f, 0x3f, 0xffc, 0x4a}, {0x8, 0x3f, 0x3, 0x0, 0xa9, 0x401}, {0x6, 0x8, 0x0, 0x56, 0x200, 0x5}, {0x7, 0x9, 0x7, 0x100000000, 0x5, 0x6}, {0x5, 0x6, 0x6, 0x80000001, 0x80000001, 0x8000000000000}, {0x3, 0x6, 0x1000, 0x1, 0x3, 0x9}, {0x0, 0x1cc, 0x6, 0xfffffffffffffffd, 0x2}, {0x1df6, 0x4, 0x5, 0x5, 0xfffffffffffff001, 0x6}, {0x401, 0x8000, 0x0, 0x9, 0x2, 0x4}, {0x20, 0x938, 0x0, 0x4, 0x0, 0xfbf9}, {0x9, 0x401, 0x7, 0x8, 0xb18, 0x6}, {0x8000, 0x4, 0xff, 0x3b, 0x5, 0xffffffffffffffbd}, {0xfffffffffffffff7, 0x3, 0x6, 0x100, 0x200, 0x80}, {0x6, 0x8000, 0x7, 0x46, 0xfffffffffffffff8, 0x6}, {0x8, 0x400, 0x10001, 0x1000, 0x5, 0x3}, {0x8, 0x4, 0x7, 0x8, 0x5, 0x7ff}, {0xff, 0x6, 0x4, 0x3, 0x3, 0x81}, {0x1, 0x2, 0x3, 0x401, 0xa8e, 0x7}, {0x5, 0x1, 0x7, 0x7fffffff, 0x5, 0x8000}, {0x4000, 0x7ff, 0x8, 0xfffffffffffff8d3, 0x10001, 0x7fff}, {0x5, 0xffffffffffffffff, 0x5, 0x17, 0x100, 0x7d}, {0x4, 0xa3, 0x4, 0xe7bc, 0x8, 0x8}, {0x1, 0x0, 0x0, 0x49, 0x200, 0x33}, {0x7, 0x5, 0x4, 0x7ff, 0x9, 0x81}, {0x900, 0x9061, 0x6, 0x1ff, 0x0, 0x8}, {0xffffffffffffffff, 0x100000000, 0x3, 0x4, 0x0, 0x7}, {0xfffffffffffffffb, 0x6, 0xff, 0x1f, 0x2}, {0xf70d, 0x8, 0x5a, 0x9, 0x32b1, 0xb4}, {0x2, 0x1, 0x8, 0x4, 0x80000001, 0x2}, {0x8, 0x4, 0x3, 0x2, 0x3, 0xfffffffffffffee9}, {0xfffffffe00000000, 0xfff, 0x3, 0x7ff, 0x1}, {0x4, 0x10000, 0x8, 0x1800000000000, 0x8001, 0x20}, {0x3, 0x5, 0x4, 0x7, 0x9, 0x5}], [{0x3, 0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x3}, {0x5, 0x9fba935ae7a05423}, {0x7}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x5}, {0x2, 0x1}, {}, {0x3, 0x1f90fb43a561096e}, {0x4, 0x1}, {0x7, 0x1}, {0x5}, {0x4}, {0x1}, {0x5}, {0x7, 0x1}, {}, {0x1, 0x1}, {0x5, 0x1}, {}, {0x5, 0x1}, {0x3}, {0x3, 0x1}, {}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x5}, {0x1, 0x1}, {}, {0x7, 0x1}, {0x7, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x5}, {0x6, 0x1}, {0x4}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0xab91e19ab877777d}, {0x0, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x1}, {0x5}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x3}, {}, {0x7}, {0x0, 0x1}, {0x7, 0x1}, {0x5}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x6, 0x1}, {0x3}, {0x4, 0x1}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x3}, {0x7}, {0x2}, {0x0, 0x1}, {0x5, 0x1}, {}, {0x4, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x7}, {0x3}, {0x4}, {0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3}, {0x5}, {0x7, 0x1}, {0x6, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x3}, {0x3, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {}, {0x5, 0x1}, {0x1}, {0x5, 0x1}, {0x5}, {0x1}, {0x7, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x24, 0x5, [@TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}]}, @TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}]}, @TCA_PEDIT_KEYS_EX={0x11c, 0x5, [@TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}]}, @TCA_PEDIT_KEY_EX={0x24, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}]}, @TCA_PEDIT_KEY_EX={0x44, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x6}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x6}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x24, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe38, 0x2, {{{0x3, 0xffffffffffffffff, 0x6, 0x5, 0x7}, 0x6, 0xfffffffffffffffb, [{0xcb4, 0xa59, 0x3, 0x6, 0xfffffffffffffffb, 0x8}]}, [{0x9, 0x1, 0xf3, 0x400, 0x400, 0x2}, {0x81, 0x4, 0x4, 0x5, 0x10000, 0xb5a}, {0x7b, 0x200, 0x8, 0x3232, 0x3, 0x3}, {0x1, 0x8, 0xffffffffffffff01, 0x9, 0x1, 0xf6}, {0x6, 0xfffffffffffffeed, 0x5, 0xff, 0x400, 0x2}, {0x94, 0x9, 0x7, 0x20, 0x9, 0x3a}, {0x480, 0x7, 0x274c, 0x1, 0x2}, {0x9, 0x2, 0xffffffffffff8001, 0x5, 0xfffffffffffffffd, 0x3f}, {0x20, 0x101, 0x8, 0x1, 0x3, 0x2}, {0x9, 0xff, 0x7, 0x6, 0x3, 0x1ff}, {0x0, 0x2, 0x7, 0x101, 0xfffffffffffffffd, 0x1}, {0x1ff, 0x5, 0xffffffffffffff00, 0x8, 0x0, 0x7}, {0x7f90, 0x6, 0x1, 0xfffffffffffffffb, 0x0, 0x3}, {0x5, 0xd5, 0x20, 0x6, 0x7, 0x800}, {0x6, 0x0, 0x5, 0x800, 0x2, 0x5}, {0x85, 0x0, 0x7, 0x4, 0x3ff, 0x6}, {0x5, 0xa00d, 0xff, 0x81, 0x3, 0x4}, {0xffffffffffffffc0, 0x80000001, 0x7, 0x80, 0x1, 0x4}, {0x4, 0xa8e, 0x4, 0x11a586a4, 0x0, 0x5}, {0x3, 0x1, 0x4, 0x1, 0x2, 0x1}, {0x8, 0x80000000, 0x1400000, 0x7fffffff, 0x3ff, 0xfffffffffffffffd}, {0xfff, 0x8000, 0x1ba, 0x1, 0x2, 0x54}, {0x9e, 0x4, 0x9, 0x80000001, 0x9, 0x7fff}, {0x100, 0x5, 0x5, 0x7, 0x8, 0x5c6}, {0x4, 0x7, 0x1e3000000000000, 0x3, 0x3f, 0x10000}, {0xb8, 0xc5, 0x720, 0x4, 0x7, 0x4}, {0x575, 0x8, 0x20, 0x2, 0x2, 0x5}, {0x10, 0x26, 0x3, 0x7, 0x1, 0x9}, {0x0, 0x20000000000, 0x100, 0x7, 0x4, 0x8}, {0x700, 0x1, 0x3ff, 0x7, 0x7, 0x800}, {0x6, 0x1, 0xffff, 0x401, 0x4, 0xfffffffffffffffa}, {0x2, 0x0, 0x2, 0x9, 0x4, 0x249}, {0x0, 0x10001, 0x791, 0x5e14415, 0x10001, 0x100000001}, {0x7fffffff, 0x2, 0x8, 0x8, 0x100, 0x3}, {0x100, 0x9, 0x2, 0xfffffffffffffffe, 0x6, 0x5}, {0x2, 0x5, 0x7f, 0x5, 0x9, 0x6}, {0x1, 0x2, 0x100000000, 0x0, 0x1, 0x80}, {0x1, 0x3, 0x7fff, 0x7, 0x6, 0xffffffff}, {0xffffffff, 0x1ff, 0x72b, 0x7, 0xca64, 0x6}, {0x73fa, 0x1, 0x4, 0x1, 0x9, 0x2}, {0x9, 0x3, 0x8, 0x9, 0xd72, 0xfffffffffffffffe}, {0x5, 0x0, 0x100, 0x5, 0xffffffffffffffff, 0x400}, {0x100, 0x3, 0x2, 0x3, 0x6, 0x100000001}, {0xadd3, 0x4000, 0x0, 0x40, 0x1, 0x7fffffff}, {0x3, 0x4, 0x5, 0x2, 0xffffffffe36df6fc}, {0x1, 0x2, 0xecc, 0x9, 0x100000001, 0x5}, {0x8, 0x1f, 0xb12f, 0x10000, 0xffffffff, 0x20}, {0x4, 0xfffffffffffffffa, 0x7, 0x7f, 0x7f, 0x8}, {0x4, 0x80000001, 0xffffffffffffff80, 0x6, 0x8, 0x6}, {0x8, 0x0, 0x8, 0xfffffffffffffc01, 0x1, 0x1}, {0x4, 0x1b, 0x5, 0x2, 0x74, 0xfffffffffffffffb}, {0x5, 0x7, 0x6, 0x200, 0x9, 0x1}, {0x8, 0x4, 0xed, 0xee, 0x3, 0x7}, {0x6, 0x3f, 0x8e2b, 0x1, 0x10001, 0xbf}, {0x2, 0x66b, 0x2, 0x9, 0x393}, {0x8, 0x100000001, 0x7, 0x6, 0x80, 0x9}, {0x5, 0x79e, 0x5, 0x9933, 0x8, 0xffff}, {0x7, 0x2, 0x1, 0x6, 0x0, 0x2}, {0x6, 0x1, 0xc000000, 0x8000, 0x46, 0x7}, {0x0, 0x20db40e2, 0x3, 0x401, 0x5, 0x2}, {0x1000, 0x10001, 0x9, 0x6, 0x5, 0x101}, {0x9, 0x3, 0x0, 0x1, 0x4, 0x8}, {0x8, 0x6, 0x100, 0x6, 0x7, 0x20}, {0x0, 0xffffffff, 0x3b, 0x8001, 0x401, 0xffffffffffffff00}, {0x7, 0x10000, 0xfa, 0x20, 0x0, 0x40}, {0x3, 0xfffffffffffff85f, 0x457, 0xa000000000000000, 0x101, 0x81}, {0x0, 0xcde, 0x9, 0x2, 0x3}, {0x7, 0x1000, 0x7, 0x20, 0x1f, 0x7fffffff}, {0x0, 0x5, 0x6, 0xfff, 0x7, 0xfffffffffffffff9}, {0x9, 0x1, 0x4, 0x80, 0x7, 0x3}, {0x5, 0x400, 0x5, 0x7, 0x7, 0x1}, {0x81, 0x4, 0xffffffffffffb5bc, 0xcc, 0x2, 0x28ab}, {0x1f, 0x40000000000, 0x4, 0x81, 0x80000000, 0x8ce}, {0x800, 0x100, 0x7, 0x6, 0xf0, 0x1}, {0xfffffffffffffffb, 0x1, 0x3, 0x80000000, 0x8, 0x2}, {0x34a, 0xb421, 0x2, 0x0, 0x7, 0x1}, {0x9, 0x1, 0x9, 0x3, 0x9, 0x8000}, {0xeee2, 0x100000000, 0x1ff, 0x100, 0x8001, 0x100}, {0xd, 0x3, 0x950, 0x2, 0x9, 0x1}, {0x8, 0x2, 0x9, 0xa873, 0x36a90c7f, 0x3f}, {0x10000, 0x8001, 0x1, 0x80de, 0xffffffffffffff8c, 0x9}, {0x0, 0x2, 0x3, 0x2, 0x10000, 0x3}, {0x7, 0x200, 0x1, 0x4, 0x800, 0x80}, {0x7, 0x5094, 0xb7, 0x8, 0x400, 0xffff}, {0x9, 0x8, 0x1, 0x52d6, 0x5}, {0x7fffffff, 0x4, 0x9, 0x2, 0x7, 0x2}, {0x5, 0x8, 0x4, 0x6, 0x20, 0xa968}, {0x6, 0x1, 0x3ff, 0xf4, 0xffff, 0x9}, {0xffff, 0x10000, 0x2, 0x8, 0xfffffffffffffffa, 0x6d4}, {0x2, 0x7, 0x8, 0x5d3d, 0xfff}, {0x5, 0x8fd, 0x3ff, 0x7fff, 0x49, 0x5}, {0xffffffffffffffff, 0x2, 0x5, 0x17f, 0x1, 0x8}, {0x0, 0x2, 0x6, 0x7, 0x9, 0x4}, {0x9, 0xffffffffffffff81, 0xbb1, 0xfffffffffffffff8, 0x5, 0x100000000}, {0xffffffffffff0000, 0x8001, 0x6, 0x0, 0x1, 0x6}, {0x5, 0x2, 0xa2c, 0x3, 0x1, 0xffffffff}, {0x6, 0x6, 0x5, 0xcb, 0x2, 0x9}, {0x1, 0xffffffffffffff62, 0x3, 0x1, 0x15, 0x2}, {0x1, 0x1ff, 0x3f, 0x0, 0xfff, 0x5fc}, {0x8, 0x81, 0x8, 0x56cb, 0xf1, 0xfffffffffffffffb}, {0x3, 0x3, 0x88f7, 0xffff, 0x20, 0x1f}, {0x0, 0x10000, 0x3eda, 0x100000000, 0x26, 0x9}, {0x0, 0xffffffffffff8001, 0xc0, 0x7f, 0x1f29, 0xffffffff}, {0x400, 0x2ae, 0xc9, 0x1f, 0x1000, 0x100}, {0x2, 0x0, 0x100000000, 0x6, 0x400, 0x8}, {0x0, 0x1000000000, 0x3e2, 0x7, 0x8, 0xffffffffffffff80}, {0x0, 0x8, 0x6, 0x9, 0x2, 0x3}, {0x8, 0x200, 0xffffffffffffffff, 0x9, 0x5, 0x2b}, {0x5, 0xdffa, 0x1, 0x2, 0x8, 0x2}, {0xffff, 0x101, 0xff, 0x5, 0xeb2}, {0xffffffff80000001, 0x0, 0x6, 0x100000000, 0x101, 0x2}, {0x0, 0x3, 0xf282, 0x1d6, 0x1, 0xa7b}, {0x20, 0x3, 0x1, 0x7ff, 0x2, 0xfffffffffffffffb}, {0x80, 0x3, 0xffffffff, 0x11, 0x8781, 0x4}, {0xa8dc, 0x9, 0xfffffffffffffffb, 0xfa, 0x8, 0x8}, {0x10000, 0x187e, 0x885, 0x7, 0xc66caba, 0x9}, {0xffffffffffffdba1, 0x0, 0x3, 0x5, 0x4, 0x9}, {0x3, 0x9, 0x8, 0x7, 0x8, 0x8}, {0xe1, 0x0, 0x9, 0x8001, 0x800, 0x6}, {0x4, 0xfff, 0xffffffff, 0x5, 0x1ff, 0x1ff}, {0x1, 0x4, 0x3, 0x7, 0x3, 0x5}, {0xa9, 0x3, 0x2, 0x0, 0x100000001, 0x8a5b}, {0x401, 0xfffffffffffffff9, 0xffff, 0x2, 0xf5, 0x45}, {0x0, 0x8, 0x6, 0x3, 0xf66, 0x4}, {0x5, 0x1, 0x2, 0xbf1d, 0x1, 0x6}, {0x2, 0x28000000000000, 0xb6, 0x4, 0x9, 0x1}, {0xa2fd, 0x1, 0x8, 0x0, 0x75a, 0x8}, {0x0, 0x8, 0xfffffffffffffc00, 0xfb40000, 0x3, 0x400000}], [{0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {0x7, 0x1}, {0x7}, {0x0, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {}, {0x4}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {0x5}, {0x1}, {0x2}, {0x7}, {0x0, 0x1}, {0x7, 0x1}, {0x1}, {0x0, 0x1}, {}, {0x2, 0x1}, {0x1}, {0x29d5c1426709af3f}, {0x2, 0x1}, {0x7}, {0x7}, {0x2, 0x1}, {0x6}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x7}, {0x3, 0x1}, {0x5, 0x1}, {0x6}, {0x4}, {0x5, 0x1}, {0x7}, {0x4}, {0x5, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x4}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x4}, {0x7, 0x1}, {0x3, 0x1}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x3}, {0x5, 0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x3}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x4}, {0x3, 0x1}, {0x7, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x5}, {0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x1}, {0x5, 0x1}, {0x1}, {0x7, 0x1}, {0x2}, {0x2}, {0x2}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x3}, {0x7, 0x1}, {0x6, 0x1}, {0x0, 0x1}, {0x7}, {0x4}, {}, {0x3}, {0x5}, {0x2}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x5}, {0x3, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x7}, {0x2, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}]}}]}, {0x80, 0x6, "a239e615ed6f94a1d81ddffaea3e7dbc01316967f7eed81c6f37aa3e7f0f55b458c8351ababc2bfc082c5349836267bd3dc901fa20bd66fbf520bb800dd7e0e0fbcb63dd254eb15ba06db6e8f9db93e0b4746190c88a72b04a0fb0da9f27b6e4dbf7bf777d2fd074ca13be48227a78eec142016f1e3fffbbf799b22c"}}}}]}, 0x4e08}, 0x1, 0x0, 0x0, 0x2}, 0x10020004003) bind$inet(r4, &(0x7f0000005480)={0x2, 0x4e23, @multicast1}, 0x10) arch_prctl$ARCH_GET_GS(0x1004, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) dup2(0xffffffffffffffff, r4) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="18c18377381651f40aa76a85150dab1fd81d3423f4548d5709e4095abf7dd4390e4aef82f9d786756ea184f602d705e8df80a2621ee3a4eebb7fc70d8c38563c87596ac4dd7a7f5164c8859d00007fdc842e9fc6864b710dd1b51fbc51f72de99cf612005f5edff6d02793c9aa0407aab7f4983a401d82d41a5c0ce7893fdc962e3599c80b3959b85f5bd026e679a6a6675fb367ae99ca4140cf2fcd6819ccda"], 0x1}}, 0x44801) sendto$inet(r2, &(0x7f0000000400)="1c554cf8b93687aab173d8032491f239015b10fe50222ecdab43be4f8e44ebb3fd0953c47b4b239192db69ddbdf96044e77bcca1da6e934db89b0000000000000000", 0x42, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) socket$inet(0xa, 0x801, 0x0) ioctl$CAPI_GET_MANUFACTURER(0xffffffffffffffff, 0xc0104307, &(0x7f0000000040)=0x8d) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000002c0), &(0x7f0000000480)=0x4) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000540)="67855963fd963760af248522ee35e35c27679e6917d7630f8ad85375bc706c11ef62c906f233b254a7844444398e7d99fa8f236805dafd93d12066a1cb992838e5fbb5ede712e10b26b260fba1d32a0793d187f457b99eb35744d8a8bff3cf32cbbaea7d279eb07d78d9a90236171d7f532a0dffcda6afe3091f3c76c8554b7b1b27916d0c7a59d7ca48a1262bbedfea1116b3c44c4da89c4dc0922042257c4a25c03f3ebbe798f0a7fa42d3b417e5eeee0c6512d57dec6c1e76455c80fa5b8c87ccbfa86f86019d4d7a0347a19b4aec28d7fd3e1be890ab666138c24fd0dae7598966e3cddf7e113d2bb10896133af3002431bfb8eccb97a2") socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 118.997687][ T8299] Invalid argument reading file caps for ./file0 08:51:45 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x640280, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) close(r0) socket$inet(0x2, 0x0, 0x100000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 08:51:45 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x2000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) unshare(0x600) socket$inet6(0xa, 0x0, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "07424a0ea015311c7227c3b6cf6e8eca17c435a81eb8c1fff4fc3bb9394c465c", 0x97, 0x502f, 0x3, 0x9, 0x210}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x3, 0x0) setsockopt$inet_buf(r0, 0x0, 0x26, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0xa180, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x25) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000100)={{0x10001, 0x4, 0x6, 0x5, 0x3ff, 0x6}, 0x6}) uname(&(0x7f0000000300)=""/66) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000200), 0x4) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$VIDIOC_G_EDID(r0, 0xc0285628, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240)=0x55, 0x4) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000000)={{}, {0xf}}) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) 08:51:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:45 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 119.203807][ T8319] Invalid argument reading file caps for ./file0 08:51:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:46 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 119.360175][ T8335] Invalid argument reading file caps for ./file0 08:51:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) [ 119.526831][ T8343] Invalid argument reading file caps for ./file0 [ 119.643216][ T8320] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:51:46 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, 0x1c) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'veth1_to_team\x00', 0x200}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f00000000c0)) 08:51:46 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:46 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, 0x0, &(0x7f0000000300)) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(r2) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10010000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=@newtaction={0x4e08, 0x30, 0x300, 0x70bd26, 0x25dfdbfd, {}, [{0x1f88, 0x1, @m_pedit={0x1f84, 0xf, {{0xc, 0x1, 'pedit\x00'}, {0x1eb0, 0x2, [@TCA_PEDIT_KEYS_EX={0x148, 0x5, [@TCA_PEDIT_KEY_EX={0x54, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}]}]}, @TCA_PEDIT_PARMS={0xeb0, 0x2, {{{0x40, 0x6, 0x20000000, 0x4, 0x7}, 0xb4, 0x80000000, [{0x101, 0x2fe, 0x1ff, 0x0, 0xfffffffffffffff8, 0x5}, {0x8, 0x9, 0xffff, 0xd0, 0xe77, 0x9}, {0x9, 0x5, 0x1, 0x8, 0x7f, 0xbf}, {0x5, 0x3, 0x433, 0x4384, 0x1, 0xffffffff}, {0xffffffffffffff7f, 0x6, 0x4, 0xabee, 0x6, 0xffffffff}, {0xfff, 0x0, 0xfffffffffffffff9, 0x2c2c00, 0x5, 0x2}]}, [{0x5, 0x7, 0x40, 0x3, 0x5dd, 0x401}, {0x7fffffff, 0xffffffff80000001, 0xffb, 0xa674, 0x8, 0xffffffff904ec144}, {0xff, 0x80000001, 0x7f, 0x6, 0x536}, {0x2, 0x100000, 0x200, 0x0, 0x0, 0xd7}, {0x4, 0x1ff, 0x7fffffff, 0x7f, 0x100000000, 0x8001}, {0x3, 0x400, 0x5, 0x1, 0xfffffffffffff801, 0x7fffffff}, {0x1f, 0x5, 0x1, 0xffff, 0x9, 0x80000000}, {0x1, 0xa1f4, 0x7, 0x8, 0x100000001, 0xd2c7}, {0x1, 0x200, 0x6, 0xb, 0x6, 0x8000}, {0x1, 0x7f, 0xffffe00000000000, 0xff, 0xffffffffffffffd8, 0x4}, {0x3, 0x7, 0xff, 0x100000001, 0x7, 0x1}, {0x800, 0x1, 0x5, 0x80, 0x3, 0x200}, {0x44, 0x6, 0x401, 0x10000, 0x9, 0xfffffffffffffff7}, {0x2a1e, 0xfffffffffffffff9, 0x9, 0x6, 0x8001, 0x5}, {0xffff, 0x5, 0x0, 0xfff, 0x5, 0x1}, {0x8c5e, 0x4, 0x4, 0x6, 0x9d, 0xae}, {0x6, 0x10000, 0x6, 0x3, 0x4, 0xfffffffffffffe00}, {0xffff, 0x568900d7, 0x4, 0x6ff65c88, 0xfff, 0x870}, {0xffffffff90a0fd0e, 0x2, 0x202d800, 0x9063, 0x4, 0x2}, {0x80000001, 0x7, 0x10001, 0xffffffffffff0000, 0x3, 0xdb}, {0x7, 0xd1, 0xed3, 0x5f1, 0x5, 0xc79}, {0x5, 0x2, 0x1, 0x100, 0xfff, 0xffffffffffffff80}, {0x2, 0x1f5, 0xffffffffffff7fff, 0x5, 0x9, 0x81}, {0x1f, 0x0, 0x6, 0x10000, 0x7, 0xffff}, {0x101, 0x4, 0x7, 0x6, 0x7f, 0x200}, {0x564, 0x8, 0x0, 0x9, 0x0, 0x401}, {0x7, 0xbe, 0x1ff0000000, 0x5, 0x9, 0x2}, {0xfffffffffffffffb, 0x2, 0xe2, 0x9, 0x1f, 0x40}, {0x87, 0x6f2, 0x6, 0x7, 0xfffffffffffffff7, 0x7}, {0x7, 0x668, 0xfffffffffffff6f6, 0x1f, 0x80, 0x4}, {0xce, 0x8, 0x6, 0x3, 0x8000, 0x1}, {0x1, 0x100000000, 0x9, 0x6298, 0x1, 0x8}, {0x7, 0xffffffffffffff37, 0x5b, 0x1, 0x9, 0x5}, {0x10001, 0x4, 0x3, 0x6, 0x7, 0x3}, {0x9, 0x101, 0x290, 0x8, 0x3ff, 0xfffffffffffffffe}, {0x1, 0x3ff, 0xfffffffffffffffa, 0xb51, 0x2, 0x2}, {0x0, 0x4, 0x4, 0x1, 0x7fffffff, 0x6}, {0x8, 0x4, 0x6, 0x8000, 0x1, 0xdbad}, {0x3, 0xffffffffffffff81, 0x0, 0x1, 0x2, 0x74fd9912}, {0x9, 0xffff, 0x9, 0x0, 0x5, 0xde}, {0x401, 0x8, 0x20, 0x10000, 0x0, 0x7}, {0x3, 0x3, 0x3, 0x7, 0x7}, {0x81, 0x7fff000000, 0x5, 0x101, 0x81, 0x3ff}, {0x5, 0x40, 0x8, 0x4, 0x800, 0x1}, {0x800, 0x1, 0x8, 0x5, 0x2, 0x2}, {0x2, 0x80000000, 0x1000, 0x8, 0x3, 0x4}, {0x9, 0xfffffffffffffffe, 0x7, 0x6, 0x4, 0x3}, {0x9, 0xc16, 0x7f, 0x100, 0x8, 0xc9}, {0x8, 0x8996, 0x9, 0x3, 0x9, 0x4}, {0x6, 0x1ff, 0x6a4, 0x0, 0x3, 0x101}, {0x8, 0x1e1a5a16, 0x101, 0x5, 0x9, 0x9}, {0x200, 0x7f, 0x7, 0x8b, 0x100000001, 0x20}, {0x4, 0x8, 0x0, 0x3, 0x1, 0x8001}, {0x466, 0xfffffffffffffc00, 0xfc1, 0xfffffffffffffffd, 0x5e2, 0x6}, {0x3, 0x4, 0xffffffff, 0x2, 0x7, 0x902}, {0x3bcc, 0x8, 0x7ff, 0x47, 0x7fffffff, 0x3}, {0x100000001, 0x5, 0x1, 0x3, 0x4, 0x7}, {0x0, 0x3ff, 0x5, 0x0, 0xfffffffffffffffb, 0x4}, {0x1, 0x5b53800000000000, 0x35d, 0x0, 0x5, 0xfffffffffffffff9}, {0x3ff, 0x2, 0x2, 0x2, 0x9, 0x5}, {0x3, 0x6, 0x4, 0x568f, 0x9, 0x9}, {0xf29, 0x505d, 0x0, 0x1, 0x1, 0x7f}, {0x7ff, 0x9, 0x1, 0x42, 0x8, 0x4}, {0x6, 0x7, 0x8, 0x2, 0x6, 0x3}, {0x4, 0x9, 0x0, 0x94c3, 0x8, 0x7015}, {0x3, 0x6, 0x1, 0xca5, 0x101, 0x8}, {0x5, 0x1f, 0x0, 0x2f1, 0x11, 0x80000000}, {0xd89, 0x8, 0xafa, 0x400, 0x9, 0x100000000}, {0xfff, 0x3, 0x3, 0x100, 0xe728, 0x5}, {0xa4d1, 0xcc5a, 0xd63, 0x3, 0x0, 0x8}, {0x2000000, 0xf24, 0x52de, 0x40, 0xd91, 0xffffffffffffffff}, {0x4, 0x20, 0x2, 0x3, 0x5, 0x10001}, {0x5, 0x8, 0x4, 0x101, 0x3, 0x8}, {0x7, 0x10000, 0x0, 0x7d4, 0x8, 0x1ba6}, {0x1, 0x4, 0xb7, 0x3, 0x1, 0x198000000000000}, {0xc1, 0x3, 0x6, 0x2, 0x5, 0x4}, {0xffffffffffffff01, 0x5, 0x6, 0x0, 0x5, 0x8}, {0x9, 0x6, 0x9, 0x5, 0xec62, 0xff}, {0xb836, 0x3ff, 0x0, 0x2, 0xbf, 0x6}, {0x1000, 0x3f, 0xdbf6, 0x4, 0x7, 0x10000}, {0x9, 0x2, 0x8, 0xd92, 0x39b8, 0x400}, {0x8, 0x6, 0x7, 0xffff, 0x6, 0x5}, {0x5, 0x9, 0xd5, 0x8, 0x800, 0x8001}, {0x100000001, 0x1f, 0x0, 0x7, 0x7f, 0x8}, {0xfffffffffffffffc, 0x7, 0x800, 0x5, 0x5, 0x3}, {0x6287, 0x8, 0x6, 0x3, 0x1ff, 0x101}, {0x9, 0x0, 0x0, 0xffffffff, 0x3f, 0x8}, {0xffffffff, 0x3, 0x542, 0x5, 0x6, 0xfff}, {0x3, 0x7fff, 0x5, 0x10000, 0x1, 0x1}, {0x1f, 0x0, 0x4, 0x4, 0x10001, 0x10001}, {0x7f, 0x8, 0xb660, 0x1, 0x800, 0x8}, {0x4, 0x3, 0x6, 0x6, 0x1, 0x6}, {0x7fffffff, 0x19a, 0x2, 0xd65b, 0x1, 0xffffffff}, {0x561, 0x400, 0xfff, 0x3, 0x1, 0xff}, {0x9, 0x1, 0xff, 0x75, 0x401, 0xffffffff}, {0x80000001, 0x9, 0x8, 0x80000001, 0x6, 0x5}, {0x10000, 0x7fff, 0x4, 0x1, 0x401, 0x6}, {0xfffffffffffffff8, 0x100000000, 0x1, 0x2, 0xffffffffffffa3b6}, {0x8, 0x2, 0x814, 0xbb437b6, 0x4, 0x8}, {0x3, 0xfff, 0x4, 0x101, 0x7ff, 0xe4a9}, {0xf6, 0x7, 0xfffffffffffffff9, 0x2, 0x800, 0x1000}, {0x10000, 0xa000000, 0x5, 0x0, 0x6, 0x2}, {0x7ff, 0x9, 0xff9, 0x13a3, 0x100000001, 0xfc2}, {0x2, 0xfffffffffffffffd, 0x60, 0x8000, 0x8001, 0x100}, {0x5, 0x0, 0x1000, 0x0, 0x81, 0x8}, {0x6, 0x9, 0x7, 0x2, 0x909, 0x100}, {0x4, 0x20, 0x0, 0x4, 0x3, 0x80000001}, {0xff, 0x8000, 0x80000000, 0x3f, 0x6, 0x6}, {0x800, 0x6, 0x40, 0x3, 0x800, 0xffffffff}, {0x2, 0x2, 0xdf4, 0xfff, 0x1, 0x7ff}, {0x9, 0x7f, 0x9, 0x8000000000000000, 0x9, 0x7}, {0x6, 0x6, 0x5, 0x3, 0x3, 0x7}, {0x1f, 0x31, 0x3, 0x4, 0x159c, 0x4}, {0x8, 0x4, 0xffff, 0x4, 0x3, 0x7fff}, {0x8001, 0x4163e88a, 0x4, 0xf4, 0x5, 0x5}, {0x4, 0x6c, 0x8, 0xff, 0x8000, 0x401}, {0x7, 0x3ff, 0x2, 0x6, 0x6, 0xd2}, {0x5, 0x3, 0x40, 0x9, 0x8000, 0x400}, {0x200, 0x7, 0x100000001, 0x4, 0xfffffffffffffe01, 0x5}, {0x0, 0x9, 0x49, 0xfffffffffffffffb, 0x3d72, 0x8}, {0x9, 0x7, 0x7, 0x7, 0x7, 0x3}, {0xc3f7, 0x1, 0x5, 0x3ff, 0x200, 0x1}, {0x40, 0xb1f8, 0x1, 0x6, 0x100000001, 0x9}, {0x3, 0x5, 0x20, 0x1, 0x3, 0x1}, {0x2, 0x1, 0xffff, 0x8, 0xfffffffffffffffc, 0xd}, {0x6, 0x2, 0x10000, 0x2, 0x6, 0xe}, {0x1000, 0x9, 0x6, 0x9, 0x3ff, 0xffffffffffff90e9}, {0x7fffffff, 0x8000, 0x0, 0x7, 0x81, 0x2}], [{0x5, 0x1}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x4}, {0x5}, {0x4}, {0x7, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {0x1}, {0x3}, {0x5, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x4}, {0x3}, {0x3, 0x1}, {0x0, 0x1}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x3}, {0x3, 0x1}, {}, {0x7}, {}, {0x2}, {0x4}, {0x1, 0x1}, {0x1}, {0x0, 0x1}, {0x5}, {0x7}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x7, 0x1}, {}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x5, 0x1}, {0x4, 0x1}, {0x4}, {0x5}, {0x3}, {0x2, 0x1}, {0x5}, {0x0, 0xfe52ef1d5cee0695}, {0x0, 0x1}, {0x7}, {0x1}, {0x7}, {0x1, 0x1}, {}, {0x5}, {0x5, 0x1}, {0x7}, {0x4, 0xc0a1cb95989b7073}, {0x7}, {0x0, 0x1}, {0x7}, {0x7}, {0x5}, {0x7}, {0x7, 0x1}, {0x7, 0x1}, {}, {0x7}, {}, {0x2, 0x1}, {0x5, 0x1}, {0x1}, {0x5}, {0x0, 0x1}, {}, {0x1, 0x1}, {0x5}, {0x5}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x7}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x3}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x1}, {0x7, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x3}, {0x7}, {0x2, 0x1}, {0x4}, {0x5, 0x1}, {}, {}, {}, {0x3}, {0x5, 0x1}, {0x5}, {0x0, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x94, 0x5, [@TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}]}, @TCA_PEDIT_KEY_EX={0x3c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x1c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0x2c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x8, 0x101, 0x5, 0x5942, 0x10000}, 0x7, 0x400}, [{0x5, 0x4, 0x5, 0x0, 0x7, 0x3}, {0x9, 0x100000000, 0x20, 0x101, 0x3, 0x32}, {0xa61, 0x0, 0x8, 0x100000000, 0x509}, {0x1, 0x100000001, 0xafb, 0x101, 0xffffffffffffffe1, 0x8}, {0xfd31, 0x9, 0x1, 0x0, 0x5166, 0x3}, {0x5, 0x7f, 0x8, 0x8, 0x5, 0x80000001}, {0x959b, 0x2, 0x81, 0x200, 0x9, 0x7ff}, {0x80000000, 0x0, 0x7, 0x9, 0x4, 0xf4f5}, {0x20, 0x20, 0x0, 0x8, 0x800, 0x80}, {0x5, 0x8, 0x4d22, 0x5295d1bf, 0x0, 0x2}, {0x8c3, 0xc17, 0x10001, 0x8001, 0x8, 0x2}, {0x5, 0xdce, 0xffff, 0x4, 0x9, 0x8000}, {0x10001, 0x58, 0x0, 0x3, 0x1, 0x8000}, {0x3, 0x40, 0xd, 0x6, 0x7fff, 0x3}, {0x1, 0x44, 0x100000001, 0x400000000000000, 0x7, 0xfff}, {0x6, 0x7, 0x878, 0x9, 0x2, 0x80}, {0x5, 0x5, 0x7, 0x3, 0xc3, 0x226}, {0x4c, 0x2, 0x3f, 0x1, 0x3262, 0xba68}, {0xa7, 0x3, 0x17c, 0x2, 0x331, 0x8}, {0x1, 0x7fff, 0x81, 0x40, 0x4, 0x401}, {0x7fff, 0x0, 0x7fff, 0x100eb9cd, 0x0, 0x46c}, {0x3ff, 0xff, 0xfffffffffffffffb, 0x4, 0x400}, {0x100000000, 0x0, 0x0, 0x9, 0x9, 0x6}, {0x1ff, 0x8, 0x5, 0x8, 0x5, 0x6fa8}, {0x400, 0x2f5, 0x1f, 0x7, 0x100000001, 0x9}, {0x0, 0x8, 0x7f, 0x0, 0x40, 0x1}, {0x1, 0xfffffffffffffffd, 0x9, 0x3, 0x100000000, 0x800}, {0x8708, 0x6, 0x101, 0x1, 0x30cbad20, 0x1}, {0x2, 0x6, 0x400, 0x5, 0x949, 0x3d7}, {0x5, 0x6, 0x4, 0x6, 0x4dc8, 0x20}, {0x6, 0x4, 0x81, 0x5, 0x3, 0x6198dcf3}, {0x7, 0x0, 0x100000001, 0x200, 0x7, 0x7}, {0x0, 0x7, 0x9, 0x100000000, 0x0, 0x9}, {0x4, 0xc8c4, 0x0, 0x1f, 0xe57, 0x40}, {0x100000001, 0xa8, 0x3, 0x7fff, 0x5}, {0x0, 0x10000, 0x2, 0xe35, 0x8, 0x81}, {0x8, 0x9ec5, 0x8, 0x100000000, 0x4, 0x100000000}, {0x5, 0x2, 0x2, 0x68, 0x18, 0x954}, {0x100000001, 0xfff, 0x0, 0x0, 0xffffffffffff7fff, 0x6}, {0xf8, 0x6, 0x401, 0x4, 0x2, 0x5}, {0x2, 0x8, 0x7, 0x82, 0x440cec71, 0x7}, {0x2, 0x9, 0x1f, 0x4, 0x0, 0x1}, {0x1, 0x80000001, 0x5, 0x6, 0x81, 0x5f}, {0x100000001, 0x0, 0x401, 0x7fffffff, 0x1000, 0x3a7f}, {0x4, 0x8, 0x4, 0x8, 0x2, 0xdc4e}, {0x2, 0x0, 0x100000001, 0x100000000, 0x0, 0x7}, {0x77, 0x2378, 0x6, 0x5, 0x2594, 0x3f}, {0x1ff, 0x9, 0x3, 0x7, 0x9, 0x3}, {0x52, 0x2, 0x8, 0x2, 0x6, 0x7}, {0x7ff, 0x1, 0xa79, 0x8, 0x7, 0x6}, {0xffffffff, 0xaf5, 0xfffffffffffffff7, 0x10000, 0x7fffffff, 0x5}, {0xc2a, 0x5, 0x5639, 0x4, 0x3, 0x3}, {0x0, 0x4, 0x10000, 0x46, 0x9, 0x8000}, {0xd8b1, 0x8f, 0xffffffff80000000, 0x9, 0x5, 0x1}, {0x9, 0x5, 0x0, 0x4, 0x3, 0x7}, {0x2, 0x3, 0x1, 0x7, 0xa6, 0x866}, {0x4, 0x0, 0x4, 0x3, 0x4, 0x2}, {0x8, 0x101, 0x9, 0x0, 0x0, 0x1}, {0x3, 0x1, 0xb27, 0x80, 0x4, 0x2}, {0x0, 0x2, 0x75, 0x0, 0x4, 0x3}, {0x9, 0xd89, 0xfff, 0x81, 0x7fffffff, 0xfffffffffffffffd}, {0xfffffffffffffffa, 0x3, 0x1, 0x9, 0x2, 0xcc6a}, {0x9390, 0x4, 0x7fff, 0x4, 0x1000, 0x80}, {0x2, 0x1b5, 0x0, 0x4, 0x2, 0x208}, {0x5, 0x6, 0x6c, 0x7, 0x9, 0x5}, {0x4, 0xffffffff, 0xdab2, 0x1000, 0x5, 0x3010}, {0x7, 0x4, 0xff, 0x8, 0xffffffffffffffff, 0x2}, {0xff, 0x6, 0x8001, 0x0, 0x80, 0x8872}, {0x2, 0x6, 0x5, 0x6, 0x100, 0x8001}, {0x40, 0x6, 0x8, 0x40, 0x3, 0x3}, {0x1, 0x6d, 0x7fff, 0x8, 0x2, 0xffffffffffffffc1}, {0x1, 0x2, 0x8, 0xca0, 0x7, 0x8}, {0xe27, 0x6, 0x9, 0x1, 0x0, 0x401}, {0x10001, 0x80, 0xfffffffffffffc36, 0x9, 0x7, 0x8}, {0x0, 0x7, 0x100000000, 0x7, 0x80000001, 0x1}, {0x7, 0x1, 0x3, 0x61f, 0x3196, 0x4}, {0x2, 0x639, 0x4, 0x80000000, 0x6, 0x6}, {0xfffffffffffffff8, 0x5, 0x0, 0x1f, 0x0, 0x18}, {0x0, 0x7, 0x10000, 0x4, 0x2, 0x46}, {0x5, 0x8001, 0x9, 0xff, 0xffffffff, 0x8}, {0x8, 0x1f, 0x400, 0x3ff, 0x5, 0x90e}, {0x1, 0xfffffffffe0ecac9, 0x200, 0x401, 0xffff, 0x80000001}, {0x7f, 0x6, 0x80, 0xfff, 0x6, 0xfff}, {0x5, 0x401, 0xfff, 0x2, 0x1ff, 0x5}, {0x81, 0x1, 0x6, 0x1, 0x0, 0x9}, {0x1, 0x1f, 0x6, 0x4, 0x0, 0x9}, {0xbfc5, 0x10001, 0x5, 0xe0a, 0x9d0000000}, {0xd1c3, 0x10000, 0xf2, 0x1, 0x100000001, 0x9}, {0x3, 0x5, 0x3761, 0x6, 0x1, 0x80000001}, {0x6c9, 0x5, 0x9, 0xa4, 0x3}, {0x5, 0x1ff, 0x8, 0x3, 0x101, 0xfffffffffffffff9}, {0x706, 0x0, 0x477e5a75, 0x3f, 0x80000001, 0x7ff}, {0x9d40, 0x7, 0x4, 0x4, 0x401, 0x1}, {0x9, 0x74b, 0x8001, 0x800, 0x3, 0x7}, {0xfc6, 0x40004000, 0x4, 0xffff, 0xfffffffffffffffc, 0x37bc}, {0x35, 0x400, 0xffff, 0x4, 0x800, 0x4}, {0xb7, 0x65e, 0x7fffffff, 0x10000, 0x4}, {0xfffffffffffffffd, 0x3, 0x1, 0x0, 0x8, 0x4}, {0x9bd0, 0x20, 0x6, 0x6, 0x20000000000000, 0x7fffffff}, {0xffffffffffff7fff, 0x2, 0xffff, 0x8, 0x3b51, 0x400}, {0x2, 0x6, 0xfff, 0x7, 0xffffffff, 0x8}, {0x4, 0x1f, 0x799, 0x9, 0x1, 0x3ff}, {0x4, 0xfffffffffffffffa, 0xffffffffffffff0e, 0x5d28, 0x9}, {0x3, 0x3, 0x5, 0x0, 0x7fff, 0x1000}, {0xb6a9, 0x9, 0x2, 0x8, 0x9, 0x7}, {0x9, 0x93a, 0x4, 0x5, 0x10001, 0x7}, {0x4, 0x80000000, 0x0, 0x100000000, 0x3, 0x5}, {0x1, 0x3ff, 0x6, 0xffffffff, 0xf7fd}, {0x2, 0x2db6, 0x2, 0x2, 0x0, 0x6}, {0x3ff, 0xb6, 0x7, 0x80000000, 0x7, 0x3e5a935f}, {0x8, 0x4, 0x4, 0x6, 0x7f4f, 0x5}, {0x4, 0x5, 0x3, 0x8, 0x8, 0xffffffff7fffffff}, {0x20, 0x6a89, 0x3, 0xfffffffffffffe00, 0x401, 0x5}, {0x4, 0xfff, 0xe0, 0x81, 0x3, 0x9}, {0x8, 0x3, 0xf69, 0x6, 0x0, 0xd1}, {0x5, 0x3ff, 0x6ac, 0x2, 0x7ff, 0x7}, {0x1, 0xce8e, 0x7, 0x0, 0x7, 0xfffffffffffffffd}, {0x6e57, 0xcaa, 0x4, 0x4, 0x7, 0x3}, {0x8000, 0x5, 0x7, 0x7ff, 0x8001, 0xfff}, {0x3, 0x4, 0x78a, 0x200, 0x40800000, 0x3}, {0x5, 0x6c9, 0x40, 0x80, 0xfffffffffffffffd, 0x80000000}, {0x8, 0x1, 0x8, 0x8, 0xdd, 0x7}, {0x2, 0xc0, 0x2, 0x7fffffff, 0x7}, {0xc9ce, 0x2, 0x7, 0xffffffff, 0x2, 0x3}, {0x9, 0xf4, 0x7, 0x200, 0x9, 0x5}, {0x9964, 0x2, 0x100, 0xffffffff, 0x7, 0x2}, {0x3, 0x7, 0x4, 0x0, 0x83}, {0x9cba, 0x100000000, 0x5, 0x9, 0x6, 0x6}], [{0x5}, {0x0, 0x1}, {0x3}, {0x4}, {0x2, 0x1}, {0x2, 0x1}, {0x4}, {0x7, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x3}, {}, {0x2}, {0x0, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0x29b49265e53ff339}, {0x7, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5}, {0x5, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {}, {0x5}, {0x2, 0x1}, {0x3, 0x1}, {0x5}, {}, {0x7}, {0x5}, {0x6}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x1}, {0x2}, {0x0, 0x1}, {0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x2, 0x1}, {}, {0x2}, {0x5}, {0x7}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x3}, {0x2}, {0x7, 0x1}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x4, 0x1}, {0x1}, {}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3}, {0x3}, {0x7}, {0x3}, {0xbafe79829641ffff}, {0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x7}, {0x5}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x7}, {0x5}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x7, 0x1}], 0x1}}]}, {0xc0, 0x6, "ed7b0dc0acd8dae804073c193ce70a8c816802617a39fdc7fb0e0ed7cf03470505da3f1bcd2d5c2a35b719721e171cf1cfe2c377ea2e7654088f7e2e2b54324c77db8262527caac213b870d7a847eae7027b42c2417be2ec4b3d099f00a786b12c3f770105e31429a4ec6e31de2537f87a43da46b6a2b4cd1cc11212fb206d2b7137c88d9afbf7e0bf9f1ceea1701ba25223cdd35446272be13cfe5acfba20f830fb2d564f790a527c5e3d842a7e3f413ea64a1838f3323491007382"}}}}, {0x2e6c, 0x1, @m_pedit={0x2e68, 0x3, {{0xc, 0x1, 'pedit\x00'}, {0x2dd4, 0x2, [@TCA_PEDIT_KEYS_EX={0x1a0, 0x5, [@TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}]}, @TCA_PEDIT_KEY_EX={0x4}, @TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7b1fde776f2fb7df}]}, @TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}]}, @TCA_PEDIT_PARMS={0xe98, 0x2, {{{0x200, 0x2, 0x0, 0x1, 0x8}, 0x7, 0x10001, [{0xffffffffffffff80, 0x4, 0x6, 0x3fff8000000, 0x6, 0x2}, {0x7fffffff, 0x8, 0x9, 0x7, 0xff, 0x1}, {0x3, 0x4, 0xc79, 0x4, 0x708, 0x2b}, {0x5, 0x1, 0xffffffffaf919d67, 0x7d46, 0x10001, 0x640}, {0x3, 0xa26a, 0xd5, 0x5, 0xbc, 0xa4a7}]}, [{0x7, 0x80000001, 0x0, 0x1, 0x7, 0x100000000}, {0x0, 0x5, 0x1, 0x4, 0x8, 0x304}, {0x5, 0x6, 0x3, 0xffff, 0x664, 0x8}, {0xfffffffffffffff7, 0x5, 0x0, 0x8001, 0x10001, 0x101}, {0x2, 0x200, 0x3, 0x5, 0x100, 0x7f}, {0x7fffffff, 0x80000000, 0x4, 0x1f, 0x8001, 0x4}, {0x2, 0x0, 0x320, 0x6, 0x0, 0x3f}, {0x80000001, 0x7fffffff, 0x3, 0x4, 0x5, 0x7f}, {0x8, 0x56a, 0x4, 0x6006, 0x4, 0x5}, {0xfffffffffffffeff, 0xa9bf, 0x9, 0x1, 0x4, 0x8001}, {0x2dc3, 0x1, 0x2, 0x964, 0x2, 0x6}, {0x32fd, 0x24000, 0x0, 0x6, 0x100}, {0x3, 0x67d, 0x399000000000000, 0x5, 0x400, 0x89b}, {0x0, 0x8, 0x200, 0x9, 0x1, 0x44}, {0x7495, 0x5, 0x6, 0x6, 0x0, 0x7}, {0x6, 0x9, 0x100, 0x101, 0x2, 0xfffffffffffff000}, {0x1, 0x4, 0x331, 0x1, 0xffffffffffffffc1, 0x1000}, {0x8, 0xbea, 0x100000001, 0x7, 0x70, 0x8}, {0x2, 0x7f, 0x8000, 0x0, 0x800, 0x9}, {0x1ff, 0x7fffffff, 0x8, 0xfffffffffffffff9, 0x9, 0xd5}, {0x82b4, 0xef, 0x100000001, 0xffff, 0x20, 0xfffffffffffffffb}, {0x7, 0x0, 0x400, 0x2, 0x8, 0x15}, {0x400, 0x6, 0xe392, 0x6, 0x1, 0xc8}, {0xba0, 0x80, 0x9a7, 0x8, 0x5}, {0x800, 0x6, 0x3, 0x7fffffff, 0x5, 0xffff}, {0x1, 0xa3, 0x3, 0x3ff, 0x3, 0x8}, {0x1, 0x1, 0x0, 0x5, 0x8, 0x660}, {0x1f, 0x6, 0x1, 0x81, 0xed7, 0x10001}, {0x2, 0x100, 0x6, 0x6, 0x7, 0x80}, {0x8000, 0x210b7337, 0x8, 0x10000, 0x4, 0x5}, {0x0, 0x3, 0xc59b, 0x5e, 0x4, 0xfffffffffffffff7}, {0x1000, 0x101, 0x4494, 0x4, 0x10000, 0x61}, {0x100000000, 0x0, 0x5, 0x100000000, 0x80000000, 0x80000001}, {0x8, 0xffff, 0x8000, 0x3, 0x10001, 0xfffffffffffffffc}, {0x8001, 0xff, 0x0, 0x9, 0xca4a, 0x600000000000000}, {0x1, 0x9a16662, 0x80, 0x59e7, 0x1, 0x8}, {0x1, 0x8, 0x0, 0x80000000, 0x1af, 0x80000001}, {0x8, 0x2, 0xffb8, 0x8, 0x1, 0x1}, {0x1, 0x7f, 0xb42a, 0x1, 0xc87, 0xfff}, {0x5, 0x3, 0xffffffff, 0x8, 0x1e1}, {0x3, 0x9, 0xcfd, 0x30a2d68d, 0x7, 0x7}, {0x10001, 0x5, 0x9, 0x1, 0x5, 0x7f}, {0x1, 0x3, 0x3, 0x0, 0x8001, 0x2}, {0x6, 0x20, 0xfffffffffffffbff, 0x7, 0x2, 0xffff}, {0x5, 0x8, 0xf82, 0x3, 0x8}, {0x9, 0x5, 0x7, 0x8000, 0x5, 0x4}, {0x99, 0x5, 0x1f, 0x2, 0x4, 0x7}, {0x5c1, 0xfffffffffffff476, 0xb9, 0x6, 0x40, 0x4e07}, {0x4, 0x100000000, 0x80000001, 0x5, 0x2, 0xfffffffffffffeff}, {0x635, 0x9, 0x1, 0xd6cd, 0x0, 0x401}, {0xffff, 0x3, 0x0, 0x3, 0x8, 0x9}, {0x3, 0x7fffffff, 0x8001, 0x3ff, 0xb4, 0x1}, {0x1f, 0x2, 0xdb, 0x8000, 0x4c, 0x4}, {0x1ff, 0x7, 0x2, 0x7, 0x8, 0x5ab800}, {0x5, 0x10000, 0x1, 0x2, 0x139, 0x5}, {0x7fffffff, 0x99, 0x20, 0x42, 0x10001, 0x8000}, {0x4ba9d14e, 0x7, 0x10001, 0x1, 0x7, 0x9}, {0x8, 0x472852f3, 0x81, 0x1f, 0xffff, 0x8}, {0x4, 0x6, 0x1, 0xf8cb, 0x20, 0x6}, {0x0, 0x4, 0x0, 0x4, 0x6, 0x7fffffff}, {0xffffffffffffffff, 0x0, 0x9, 0x1, 0x5, 0x2b2d48f6}, {0x5, 0x7, 0x3, 0x97a, 0x2, 0x6a}, {0x7, 0x100, 0xcc, 0x1, 0x40, 0x4}, {0x1, 0x20, 0x0, 0x2, 0xffffffffffffffff, 0x4}, {0x1f, 0xc9b0, 0x10001, 0xa8, 0x4, 0x1f}, {0xffffffffffffffff, 0x2, 0x3, 0x3, 0x4, 0x8}, {0x1, 0xfffffffffffffff8, 0xa1, 0x6, 0x2, 0x2}, {0x200, 0x0, 0x5, 0x1f, 0x0, 0x3f}, {0x1f, 0x0, 0x3, 0x40, 0x2, 0x7}, {0x20, 0x200, 0x9, 0xfffffffffffffffe, 0x9, 0xfffffffffffffff8}, {0x7ff, 0x9048, 0x8, 0x8, 0x7, 0x5}, {0x2, 0x594f5d25, 0x1f, 0x80000001, 0x1297af2b, 0xffffffff}, {0x2, 0x2a0, 0xe5, 0x4, 0x9}, {0x1, 0x412f, 0x0, 0xa9fa, 0x0, 0xfffffffffffffffb}, {0x4, 0x8, 0x54f1, 0x100000000, 0x8, 0x5}, {0x0, 0x8, 0x4, 0x80000001, 0x8, 0x5}, {0x0, 0x8, 0x6, 0x4, 0xfffffffffffffff7, 0x5}, {0x2, 0x8, 0x3ff, 0x800, 0x7, 0x7ff}, {0x0, 0x8000, 0x9, 0x4, 0xdd8, 0x100}, {0x7, 0x211d, 0xaf, 0x1, 0xad3, 0x7}, {0x4, 0x5, 0x1, 0x5, 0x7fff, 0x80000001}, {0x4, 0x0, 0x2, 0xed, 0x1, 0x7ea}, {0x7fff, 0x400, 0x3, 0x1, 0x1, 0x1f}, {0x40, 0x9, 0x65105166, 0x8000, 0x7ff, 0x1}, {0x3, 0x7f, 0x2, 0x1, 0x1, 0x9}, {0x8, 0x3, 0x2, 0x1, 0x4e1, 0x7fff}, {0x80000001, 0x400000, 0x0, 0x4, 0xf95}, {0x92cb, 0xffffffff00000001, 0x8, 0x0, 0x0, 0xce}, {0x8, 0x9, 0x4, 0x40e, 0x2, 0x6}, {0x2, 0xffffffffffffff01, 0x4, 0x0, 0xfff, 0x2ce}, {0x1ff, 0x8, 0x9, 0x4, 0x2}, {0x4, 0x9, 0x7, 0x40, 0x6, 0x7}, {0xfffffffffffffffa, 0x9, 0xffffffff, 0x6, 0x100, 0xdfb0}, {0x6f, 0x3, 0x1ff, 0x9, 0x7, 0x1f}, {0xd5c, 0x3f, 0x0, 0x7, 0x9, 0x100000000}, {0xfffffffffffff493, 0xffffffff80000001, 0x4b, 0x8, 0x7a3, 0x3ecf87ff}, {0x0, 0x200, 0x6, 0x9, 0x1, 0x5}, {0xd8, 0x9, 0x8000, 0x5, 0x5, 0x2}, {0xffff, 0x0, 0x401, 0xff, 0xfff, 0x3f5}, {0x4, 0x0, 0x7, 0x0, 0x7fff, 0x5443}, {0xf0c, 0x80000001, 0x3f, 0x3f, 0x80000000, 0x56e8}, {0x8cc6, 0x1ff, 0x10000, 0x75, 0x400, 0x3}, {0x9, 0x6, 0x800, 0x7, 0x81, 0xc1}, {0x20, 0xffffffff, 0x800, 0x5, 0x8, 0x7fff}, {0x8, 0x9, 0x8001, 0xef, 0x5, 0x107}, {0x0, 0xfff, 0x9f21, 0x7, 0x6, 0xfffffffffffffffc}, {0x7, 0xfffffffffffffffc, 0x4, 0x534, 0x5, 0x400}, {0x7, 0x6, 0x2, 0x1f, 0x4, 0x7}, {0x9e62, 0x101, 0x9, 0x5, 0x1f, 0x9}, {0x4, 0x5, 0x10000, 0x400, 0x7, 0x1}, {0x5, 0x0, 0x8, 0x2, 0x81, 0xffffffffffffff81}, {0x3, 0x8, 0x9, 0x5, 0x3, 0x7}, {0x8, 0x3, 0x3, 0x20, 0xfffffffffffff800, 0xfffffffffffffffd}, {0x8, 0xd3, 0x9a0a, 0x2, 0x4, 0x8}, {0xfff, 0x4, 0xfffffffffffffffa, 0x6a, 0x7fffffff, 0x5}, {0x5, 0x2, 0x6, 0x7ff, 0x842, 0x7}, {0x8, 0x8, 0x9, 0x100, 0x2c4d40de, 0x8}, {0x81000000, 0x5, 0xfff, 0x80, 0x4}, {0x7, 0x4000000000, 0x0, 0x0, 0x2, 0xfc5}, {0x8, 0x1000, 0x4, 0x2, 0x331000, 0x5}, {0x0, 0x5, 0xff, 0x10001, 0xff, 0x9}, {0x9, 0x0, 0x1, 0x7, 0x4, 0x3f}, {0x3, 0x8, 0xc93, 0x80000000, 0x10000, 0x3}, {0x9, 0xae8a, 0x4, 0x3f3af634, 0x46, 0x1}, {0x7, 0xfff, 0x5, 0x4, 0x401, 0x1ff}, {0x20, 0xffff, 0x8e, 0x3, 0x4, 0xb046}, {0x8, 0x0, 0x0, 0x8, 0x6561, 0x86f5cec}, {0x8, 0x5, 0x3, 0x8001, 0xffff, 0x3}], [{0x1, 0x1}, {0x4}, {0x2, 0x1}, {0x7}, {0x3}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x7}, {0x3, 0x1}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {}, {0x3}, {0x7}, {0x7}, {0x7}, {0x7, 0x1}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x5}, {0x4}, {0x3, 0x1}, {}, {0x5}, {}, {}, {0x5, 0x1}, {0x7}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x2}, {0x4}, {0x5}, {0x3, 0x1}, {}, {0x5}, {0x0, 0x1}, {0x3, 0x1}, {0x7}, {0x5, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x7}, {0x3}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x5, 0x1}, {0x4}, {0x7}, {0x1}, {0x3, 0x1}, {0x6, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x3}, {0x2, 0x1}, {0x7}, {0x0, 0x1}, {0x7, 0x1}, {0x4}, {0x6}, {0x7, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3}, {0x7, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x2, 0x785e6a65192fb088}, {0x7, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0xf944b90b5e59b565}, {0x1}, {}, {0x7, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x4}, {0x4, 0x1}, {0x5}, {0x2, 0x1}, {0x3}, {0x5}, {0x2}, {0x4}, {0x5}, {0x5}, {0x5}]}}, @TCA_PEDIT_PARMS={0xe20, 0x2, {{{0xfffffffffffffff8, 0x80000001, 0x10000000, 0x3b6, 0x400}, 0xef0, 0xe64}, [{0x5, 0x7, 0x9, 0x1, 0x2, 0x3}, {0x7, 0x2, 0x3, 0x5, 0x6, 0x1}, {0x7, 0x8000, 0x8, 0x5, 0x536, 0x8}, {0xffffffffffffca37, 0x2, 0x1, 0x2, 0x9, 0x3}, {0x8001, 0x9, 0xffff, 0x7, 0x5, 0x100000001}, {0x8, 0x82, 0x6, 0xfbe, 0x80000001, 0x7f}, {0xfffffffffffffffb, 0x7ff, 0x0, 0x7f1, 0x5, 0x4}, {0x0, 0xdd, 0x7, 0x40, 0x3, 0x7fff}, {0x8589, 0x1, 0xda5, 0x7, 0xfffffffffffffffe}, {0x0, 0x4, 0x59, 0x200, 0x2, 0x4}, {0xde6, 0x3, 0x5, 0x8, 0x100, 0x8}, {0x9, 0x7, 0x8, 0x9, 0x630, 0x620abe95}, {0x9, 0xeef, 0x10000, 0x6, 0x7}, {0x5, 0x7f, 0x80000000, 0x7, 0x9, 0x10001}, {0x9, 0x81, 0x2, 0x8, 0x250, 0x5}, {0x1, 0x4, 0x0, 0x0, 0xa, 0xff}, {0x2, 0x1, 0xffffffff, 0x1, 0x1, 0x9}, {0x9, 0x401, 0x4, 0x0, 0x40, 0x4}, {0xfff, 0x100000001, 0x401, 0x6fe5, 0x7f, 0x2}, {0x7, 0x4, 0x7, 0x100000000000000, 0x40, 0x7fffffff}, {0x94bc, 0x5, 0x9, 0x4, 0x3}, {0x8, 0x1f, 0x7, 0xd32e, 0x7, 0x3}, {0xc07, 0x8, 0x45acff26, 0x3, 0x10001, 0x80000000}, {0xe5, 0x9b, 0x5, 0x8001, 0x10001, 0x6}, {0x10001, 0x3, 0x4, 0x3, 0x6, 0x9}, {0xe2, 0xccb4, 0x7, 0x48b, 0x7, 0x4}, {0x9, 0xf50, 0x7, 0x1, 0x9, 0x200}, {0x100000000, 0x6, 0xed78, 0x80, 0x1, 0x9}, {0x3, 0xfffffffffffffff8, 0x1, 0x2, 0x6, 0x6}, {0x1, 0x0, 0x5, 0x6, 0xf26d, 0x5}, {0x9, 0x8, 0x0, 0x1ff, 0x101, 0xd}, {0x8, 0x8, 0x10000, 0x3, 0x400, 0x584}, {0x1000000000000000, 0xfffffffffffffffa, 0x2, 0x5, 0x6, 0x3ff}, {0xffffffffffffffc1, 0x400000000000000, 0x3, 0x0, 0xe1bd, 0x7ff}, {0xffffffff, 0x9d9, 0x6c0, 0x1, 0x9, 0xffffffff}, {0x6, 0x200, 0x8000000000000000, 0x2, 0x84}, {0x0, 0x101, 0x8, 0x9, 0xffffffff, 0x4}, {0x3ff, 0xc4, 0x64, 0x3, 0x400, 0x8}, {0x1f, 0xde70, 0x1f, 0x7f, 0x2, 0x4}, {0x1, 0x16, 0x9, 0x6, 0x7f, 0x7}, {0x3ff, 0x0, 0x7, 0x3, 0xffff, 0x5}, {0x33, 0x3, 0xfffffffffffffff9, 0x1}, {0x9, 0x3, 0x8, 0xffffffff, 0x3, 0x2}, {0x5, 0x4cfa, 0x38, 0x3f, 0x5ae8, 0x5}, {0x80000001, 0xfffffffffffffff8, 0x9, 0xfff, 0xfffffffffffffff7, 0x1}, {0x8, 0x10001, 0x400, 0x101, 0x2, 0x5}, {0xcac1, 0x5, 0x9, 0x6, 0x7, 0x5}, {0x6, 0x5, 0x3ff, 0x80000000, 0x10001, 0x1ff}, {0x93, 0x1000, 0x2, 0x7, 0x2, 0xffffffffffff3322}, {0x8, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffc01}, {0x0, 0x8001, 0x10001, 0x9, 0x8, 0x6}, {0x3, 0x4, 0x7, 0x3, 0x8, 0x7fff}, {0x3892891f, 0x4, 0x28ae, 0x401, 0x1, 0x9}, {0x0, 0x3, 0x63, 0x5, 0x0, 0x5}, {0x9, 0x20, 0x80000000, 0x7fff, 0x3f, 0x8000}, {0x40, 0x400, 0x71d74118, 0x2, 0x3, 0x6}, {0x6, 0xf5, 0x1, 0xfffffffffffffff8, 0x1f, 0x8001}, {0x0, 0x5, 0x0, 0xe496, 0x8, 0x200000000}, {0xffff, 0x100, 0x81, 0x100, 0x4, 0x7}, {0x69, 0xfffffffffffff000, 0x5, 0x194, 0x5, 0xd86}, {0xa50b, 0x1, 0x0, 0x2, 0x4, 0x9}, {0x0, 0x3, 0xfffffffffffffff8, 0x100000001, 0x1, 0x7}, {0x9, 0x80000001, 0xfffffffffffff6a4, 0x5ea5ba32, 0x1, 0xfffffffffffffbff}, {0xc44, 0xffffffff, 0x5f0bde0, 0x8000, 0x0, 0x80000000}, {0x5, 0xfff, 0xf47, 0x7ff, 0x7, 0x40}, {0x6, 0x571, 0x1000, 0x3f, 0x4}, {0x1000, 0x80000001, 0x5, 0x6, 0x3, 0x7}, {0x7, 0xfffffffffffffffc, 0x8, 0x20e, 0x5, 0x9}, {0x0, 0x4, 0x9, 0x8001, 0x0, 0xfffffffffffffffe}, {0x5, 0x1000, 0x1, 0x100000001, 0x2800000000, 0x40}, {0x80000001, 0x3, 0x48, 0x3, 0x7, 0x21cf}, {0x1, 0x6, 0x80000000, 0x3, 0x7f, 0x2}, {0x6, 0x7, 0x6fd98ac1, 0x5, 0x101, 0x1}, {0x0, 0x4b, 0x1f0b, 0xfffffffffffffda7, 0x200, 0x3f}, {0x8, 0x1f, 0x2, 0x34, 0x1f, 0x1000}, {0x4, 0x8001, 0x1f, 0x3, 0x3ff, 0x1}, {0x8000, 0x100000000, 0xfffffffffffffffe, 0x2, 0x3, 0x1}, {0x0, 0x40, 0x20, 0x9, 0x7, 0x3ff}, {0x1, 0x7, 0x6, 0x0, 0x2, 0xfffffffffffffff7}, {0xeacf, 0x40, 0x3, 0xff, 0x0, 0x6}, {0xbe, 0x1, 0x185d, 0x4be, 0x8, 0x7fffffff}, {0x3, 0xdeb, 0xffffffffffff543a, 0x5, 0x4, 0x9}, {0xa87f, 0x83, 0xaff, 0x0, 0x9783, 0x1f}, {0x401, 0x81, 0x8, 0x7ff, 0x2e8b, 0x3}, {0x714, 0x3, 0x3, 0x100000000, 0x8, 0xc96}, {0xc58f, 0x800, 0x3, 0x5, 0x2, 0x1}, {0xffffffff, 0x1, 0x100, 0x7, 0x1ff80000, 0xfffffffffffffffc}, {0x20, 0x7, 0x0, 0x6, 0x3, 0x3f}, {0x8, 0xb8, 0x800, 0x7, 0xfff, 0x8001}, {0x80000000, 0x7, 0xffffffff00000000, 0x5, 0x4, 0x4}, {0x4, 0x3, 0x8000, 0xd9, 0x5, 0x4}, {0xffffffffffff81d4, 0x400, 0xf3b5, 0x0, 0x10000, 0x1}, {0x17, 0x61b3, 0x20, 0x2800000000, 0x82e, 0x101}, {0x4, 0x7, 0x6e0c, 0x7fff, 0x7, 0x8}, {0x9, 0x100000000, 0x200, 0x3ff, 0x80000001, 0x2}, {0x4, 0x0, 0x1f, 0x3f, 0xffc, 0x4a}, {0x8, 0x3f, 0x3, 0x0, 0xa9, 0x401}, {0x6, 0x8, 0x0, 0x56, 0x200, 0x5}, {0x7, 0x9, 0x7, 0x100000000, 0x5, 0x6}, {0x5, 0x6, 0x6, 0x80000001, 0x80000001, 0x8000000000000}, {0x3, 0x6, 0x1000, 0x1, 0x3, 0x9}, {0x0, 0x1cc, 0x6, 0xfffffffffffffffd, 0x2}, {0x1df6, 0x4, 0x5, 0x5, 0xfffffffffffff001, 0x6}, {0x401, 0x8000, 0x0, 0x9, 0x2, 0x4}, {0x20, 0x938, 0x0, 0x4, 0x0, 0xfbf9}, {0x9, 0x401, 0x7, 0x8, 0xb18, 0x6}, {0x8000, 0x4, 0xff, 0x3b, 0x5, 0xffffffffffffffbd}, {0xfffffffffffffff7, 0x3, 0x6, 0x100, 0x200, 0x80}, {0x6, 0x8000, 0x7, 0x46, 0xfffffffffffffff8, 0x6}, {0x8, 0x400, 0x10001, 0x1000, 0x5, 0x3}, {0x8, 0x4, 0x7, 0x8, 0x5, 0x7ff}, {0xff, 0x6, 0x4, 0x3, 0x3, 0x81}, {0x1, 0x2, 0x3, 0x401, 0xa8e, 0x7}, {0x5, 0x1, 0x7, 0x7fffffff, 0x5, 0x8000}, {0x4000, 0x7ff, 0x8, 0xfffffffffffff8d3, 0x10001, 0x7fff}, {0x5, 0xffffffffffffffff, 0x5, 0x17, 0x100, 0x7d}, {0x4, 0xa3, 0x4, 0xe7bc, 0x8, 0x8}, {0x1, 0x0, 0x0, 0x49, 0x200, 0x33}, {0x7, 0x5, 0x4, 0x7ff, 0x9, 0x81}, {0x900, 0x9061, 0x6, 0x1ff, 0x0, 0x8}, {0xffffffffffffffff, 0x100000000, 0x3, 0x4, 0x0, 0x7}, {0xfffffffffffffffb, 0x6, 0xff, 0x1f, 0x2}, {0xf70d, 0x8, 0x5a, 0x9, 0x32b1, 0xb4}, {0x2, 0x1, 0x8, 0x4, 0x80000001, 0x2}, {0x8, 0x4, 0x3, 0x2, 0x3, 0xfffffffffffffee9}, {0xfffffffe00000000, 0xfff, 0x3, 0x7ff, 0x1}, {0x4, 0x10000, 0x8, 0x1800000000000, 0x8001, 0x20}, {0x3, 0x5, 0x4, 0x7, 0x9, 0x5}], [{0x3, 0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x3}, {0x5, 0x9fba935ae7a05423}, {0x7}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x5}, {0x2, 0x1}, {}, {0x3, 0x1f90fb43a561096e}, {0x4, 0x1}, {0x7, 0x1}, {0x5}, {0x4}, {0x1}, {0x5}, {0x7, 0x1}, {}, {0x1, 0x1}, {0x5, 0x1}, {}, {0x5, 0x1}, {0x3}, {0x3, 0x1}, {}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x5}, {0x1, 0x1}, {}, {0x7, 0x1}, {0x7, 0x1}, {0x3}, {0x5, 0x1}, {}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x5}, {0x6, 0x1}, {0x4}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0xab91e19ab877777d}, {0x0, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x1}, {0x5}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x3}, {}, {0x7}, {0x0, 0x1}, {0x7, 0x1}, {0x5}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x6, 0x1}, {0x3}, {0x4, 0x1}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x3}, {0x7}, {0x2}, {0x0, 0x1}, {0x5, 0x1}, {}, {0x4, 0x1}, {0x4, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x7}, {0x3}, {0x4}, {0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3}, {0x5}, {0x7, 0x1}, {0x6, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x3}, {0x3, 0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {}, {0x5, 0x1}, {0x1}, {0x5, 0x1}, {0x5}, {0x1}, {0x7, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x24, 0x5, [@TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}]}, @TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}]}, @TCA_PEDIT_KEYS_EX={0x11c, 0x5, [@TCA_PEDIT_KEY_EX={0x4c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}]}, @TCA_PEDIT_KEY_EX={0x24, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}, @TCA_PEDIT_KEY_EX={0x34, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x7}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}]}, @TCA_PEDIT_KEY_EX={0x44, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x6}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x6}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}, @TCA_PEDIT_KEY_EX={0x24, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe38, 0x2, {{{0x3, 0xffffffffffffffff, 0x6, 0x5, 0x7}, 0x6, 0xfffffffffffffffb, [{0xcb4, 0xa59, 0x3, 0x6, 0xfffffffffffffffb, 0x8}]}, [{0x9, 0x1, 0xf3, 0x400, 0x400, 0x2}, {0x81, 0x4, 0x4, 0x5, 0x10000, 0xb5a}, {0x7b, 0x200, 0x8, 0x3232, 0x3, 0x3}, {0x1, 0x8, 0xffffffffffffff01, 0x9, 0x1, 0xf6}, {0x6, 0xfffffffffffffeed, 0x5, 0xff, 0x400, 0x2}, {0x94, 0x9, 0x7, 0x20, 0x9, 0x3a}, {0x480, 0x7, 0x274c, 0x1, 0x2}, {0x9, 0x2, 0xffffffffffff8001, 0x5, 0xfffffffffffffffd, 0x3f}, {0x20, 0x101, 0x8, 0x1, 0x3, 0x2}, {0x9, 0xff, 0x7, 0x6, 0x3, 0x1ff}, {0x0, 0x2, 0x7, 0x101, 0xfffffffffffffffd, 0x1}, {0x1ff, 0x5, 0xffffffffffffff00, 0x8, 0x0, 0x7}, {0x7f90, 0x6, 0x1, 0xfffffffffffffffb, 0x0, 0x3}, {0x5, 0xd5, 0x20, 0x6, 0x7, 0x800}, {0x6, 0x0, 0x5, 0x800, 0x2, 0x5}, {0x85, 0x0, 0x7, 0x4, 0x3ff, 0x6}, {0x5, 0xa00d, 0xff, 0x81, 0x3, 0x4}, {0xffffffffffffffc0, 0x80000001, 0x7, 0x80, 0x1, 0x4}, {0x4, 0xa8e, 0x4, 0x11a586a4, 0x0, 0x5}, {0x3, 0x1, 0x4, 0x1, 0x2, 0x1}, {0x8, 0x80000000, 0x1400000, 0x7fffffff, 0x3ff, 0xfffffffffffffffd}, {0xfff, 0x8000, 0x1ba, 0x1, 0x2, 0x54}, {0x9e, 0x4, 0x9, 0x80000001, 0x9, 0x7fff}, {0x100, 0x5, 0x5, 0x7, 0x8, 0x5c6}, {0x4, 0x7, 0x1e3000000000000, 0x3, 0x3f, 0x10000}, {0xb8, 0xc5, 0x720, 0x4, 0x7, 0x4}, {0x575, 0x8, 0x20, 0x2, 0x2, 0x5}, {0x10, 0x26, 0x3, 0x7, 0x1, 0x9}, {0x0, 0x20000000000, 0x100, 0x7, 0x4, 0x8}, {0x700, 0x1, 0x3ff, 0x7, 0x7, 0x800}, {0x6, 0x1, 0xffff, 0x401, 0x4, 0xfffffffffffffffa}, {0x2, 0x0, 0x2, 0x9, 0x4, 0x249}, {0x0, 0x10001, 0x791, 0x5e14415, 0x10001, 0x100000001}, {0x7fffffff, 0x2, 0x8, 0x8, 0x100, 0x3}, {0x100, 0x9, 0x2, 0xfffffffffffffffe, 0x6, 0x5}, {0x2, 0x5, 0x7f, 0x5, 0x9, 0x6}, {0x1, 0x2, 0x100000000, 0x0, 0x1, 0x80}, {0x1, 0x3, 0x7fff, 0x7, 0x6, 0xffffffff}, {0xffffffff, 0x1ff, 0x72b, 0x7, 0xca64, 0x6}, {0x73fa, 0x1, 0x4, 0x1, 0x9, 0x2}, {0x9, 0x3, 0x8, 0x9, 0xd72, 0xfffffffffffffffe}, {0x5, 0x0, 0x100, 0x5, 0xffffffffffffffff, 0x400}, {0x100, 0x3, 0x2, 0x3, 0x6, 0x100000001}, {0xadd3, 0x4000, 0x0, 0x40, 0x1, 0x7fffffff}, {0x3, 0x4, 0x5, 0x2, 0xffffffffe36df6fc}, {0x1, 0x2, 0xecc, 0x9, 0x100000001, 0x5}, {0x8, 0x1f, 0xb12f, 0x10000, 0xffffffff, 0x20}, {0x4, 0xfffffffffffffffa, 0x7, 0x7f, 0x7f, 0x8}, {0x4, 0x80000001, 0xffffffffffffff80, 0x6, 0x8, 0x6}, {0x8, 0x0, 0x8, 0xfffffffffffffc01, 0x1, 0x1}, {0x4, 0x1b, 0x5, 0x2, 0x74, 0xfffffffffffffffb}, {0x5, 0x7, 0x6, 0x200, 0x9, 0x1}, {0x8, 0x4, 0xed, 0xee, 0x3, 0x7}, {0x6, 0x3f, 0x8e2b, 0x1, 0x10001, 0xbf}, {0x2, 0x66b, 0x2, 0x9, 0x393}, {0x8, 0x100000001, 0x7, 0x6, 0x80, 0x9}, {0x5, 0x79e, 0x5, 0x9933, 0x8, 0xffff}, {0x7, 0x2, 0x1, 0x6, 0x0, 0x2}, {0x6, 0x1, 0xc000000, 0x8000, 0x46, 0x7}, {0x0, 0x20db40e2, 0x3, 0x401, 0x5, 0x2}, {0x1000, 0x10001, 0x9, 0x6, 0x5, 0x101}, {0x9, 0x3, 0x0, 0x1, 0x4, 0x8}, {0x8, 0x6, 0x100, 0x6, 0x7, 0x20}, {0x0, 0xffffffff, 0x3b, 0x8001, 0x401, 0xffffffffffffff00}, {0x7, 0x10000, 0xfa, 0x20, 0x0, 0x40}, {0x3, 0xfffffffffffff85f, 0x457, 0xa000000000000000, 0x101, 0x81}, {0x0, 0xcde, 0x9, 0x2, 0x3}, {0x7, 0x1000, 0x7, 0x20, 0x1f, 0x7fffffff}, {0x0, 0x5, 0x6, 0xfff, 0x7, 0xfffffffffffffff9}, {0x9, 0x1, 0x4, 0x80, 0x7, 0x3}, {0x5, 0x400, 0x5, 0x7, 0x7, 0x1}, {0x81, 0x4, 0xffffffffffffb5bc, 0xcc, 0x2, 0x28ab}, {0x1f, 0x40000000000, 0x4, 0x81, 0x80000000, 0x8ce}, {0x800, 0x100, 0x7, 0x6, 0xf0, 0x1}, {0xfffffffffffffffb, 0x1, 0x3, 0x80000000, 0x8, 0x2}, {0x34a, 0xb421, 0x2, 0x0, 0x7, 0x1}, {0x9, 0x1, 0x9, 0x3, 0x9, 0x8000}, {0xeee2, 0x100000000, 0x1ff, 0x100, 0x8001, 0x100}, {0xd, 0x3, 0x950, 0x2, 0x9, 0x1}, {0x8, 0x2, 0x9, 0xa873, 0x36a90c7f, 0x3f}, {0x10000, 0x8001, 0x1, 0x80de, 0xffffffffffffff8c, 0x9}, {0x0, 0x2, 0x3, 0x2, 0x10000, 0x3}, {0x7, 0x200, 0x1, 0x4, 0x800, 0x80}, {0x7, 0x5094, 0xb7, 0x8, 0x400, 0xffff}, {0x9, 0x8, 0x1, 0x52d6, 0x5}, {0x7fffffff, 0x4, 0x9, 0x2, 0x7, 0x2}, {0x5, 0x8, 0x4, 0x6, 0x20, 0xa968}, {0x6, 0x1, 0x3ff, 0xf4, 0xffff, 0x9}, {0xffff, 0x10000, 0x2, 0x8, 0xfffffffffffffffa, 0x6d4}, {0x2, 0x7, 0x8, 0x5d3d, 0xfff}, {0x5, 0x8fd, 0x3ff, 0x7fff, 0x49, 0x5}, {0xffffffffffffffff, 0x2, 0x5, 0x17f, 0x1, 0x8}, {0x0, 0x2, 0x6, 0x7, 0x9, 0x4}, {0x9, 0xffffffffffffff81, 0xbb1, 0xfffffffffffffff8, 0x5, 0x100000000}, {0xffffffffffff0000, 0x8001, 0x6, 0x0, 0x1, 0x6}, {0x5, 0x2, 0xa2c, 0x3, 0x1, 0xffffffff}, {0x6, 0x6, 0x5, 0xcb, 0x2, 0x9}, {0x1, 0xffffffffffffff62, 0x3, 0x1, 0x15, 0x2}, {0x1, 0x1ff, 0x3f, 0x0, 0xfff, 0x5fc}, {0x8, 0x81, 0x8, 0x56cb, 0xf1, 0xfffffffffffffffb}, {0x3, 0x3, 0x88f7, 0xffff, 0x20, 0x1f}, {0x0, 0x10000, 0x3eda, 0x100000000, 0x26, 0x9}, {0x0, 0xffffffffffff8001, 0xc0, 0x7f, 0x1f29, 0xffffffff}, {0x400, 0x2ae, 0xc9, 0x1f, 0x1000, 0x100}, {0x2, 0x0, 0x100000000, 0x6, 0x400, 0x8}, {0x0, 0x1000000000, 0x3e2, 0x7, 0x8, 0xffffffffffffff80}, {0x0, 0x8, 0x6, 0x9, 0x2, 0x3}, {0x8, 0x200, 0xffffffffffffffff, 0x9, 0x5, 0x2b}, {0x5, 0xdffa, 0x1, 0x2, 0x8, 0x2}, {0xffff, 0x101, 0xff, 0x5, 0xeb2}, {0xffffffff80000001, 0x0, 0x6, 0x100000000, 0x101, 0x2}, {0x0, 0x3, 0xf282, 0x1d6, 0x1, 0xa7b}, {0x20, 0x3, 0x1, 0x7ff, 0x2, 0xfffffffffffffffb}, {0x80, 0x3, 0xffffffff, 0x11, 0x8781, 0x4}, {0xa8dc, 0x9, 0xfffffffffffffffb, 0xfa, 0x8, 0x8}, {0x10000, 0x187e, 0x885, 0x7, 0xc66caba, 0x9}, {0xffffffffffffdba1, 0x0, 0x3, 0x5, 0x4, 0x9}, {0x3, 0x9, 0x8, 0x7, 0x8, 0x8}, {0xe1, 0x0, 0x9, 0x8001, 0x800, 0x6}, {0x4, 0xfff, 0xffffffff, 0x5, 0x1ff, 0x1ff}, {0x1, 0x4, 0x3, 0x7, 0x3, 0x5}, {0xa9, 0x3, 0x2, 0x0, 0x100000001, 0x8a5b}, {0x401, 0xfffffffffffffff9, 0xffff, 0x2, 0xf5, 0x45}, {0x0, 0x8, 0x6, 0x3, 0xf66, 0x4}, {0x5, 0x1, 0x2, 0xbf1d, 0x1, 0x6}, {0x2, 0x28000000000000, 0xb6, 0x4, 0x9, 0x1}, {0xa2fd, 0x1, 0x8, 0x0, 0x75a, 0x8}, {0x0, 0x8, 0xfffffffffffffc00, 0xfb40000, 0x3, 0x400000}], [{0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {0x7, 0x1}, {0x7}, {0x0, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {}, {0x4}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {0x5}, {0x1}, {0x2}, {0x7}, {0x0, 0x1}, {0x7, 0x1}, {0x1}, {0x0, 0x1}, {}, {0x2, 0x1}, {0x1}, {0x29d5c1426709af3f}, {0x2, 0x1}, {0x7}, {0x7}, {0x2, 0x1}, {0x6}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x7}, {0x3, 0x1}, {0x5, 0x1}, {0x6}, {0x4}, {0x5, 0x1}, {0x7}, {0x4}, {0x5, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x4}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x4}, {0x7, 0x1}, {0x3, 0x1}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x3}, {0x5, 0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x3}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x4}, {0x3, 0x1}, {0x7, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x5}, {0x1}, {0x7, 0x1}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x1}, {0x5, 0x1}, {0x1}, {0x7, 0x1}, {0x2}, {0x2}, {0x2}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x3}, {0x7, 0x1}, {0x6, 0x1}, {0x0, 0x1}, {0x7}, {0x4}, {}, {0x3}, {0x5}, {0x2}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x5}, {0x3, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x7}, {0x2, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}]}}]}, {0x80, 0x6, "a239e615ed6f94a1d81ddffaea3e7dbc01316967f7eed81c6f37aa3e7f0f55b458c8351ababc2bfc082c5349836267bd3dc901fa20bd66fbf520bb800dd7e0e0fbcb63dd254eb15ba06db6e8f9db93e0b4746190c88a72b04a0fb0da9f27b6e4dbf7bf777d2fd074ca13be48227a78eec142016f1e3fffbbf799b22c"}}}}]}, 0x4e08}, 0x1, 0x0, 0x0, 0x2}, 0x10020004003) bind$inet(r4, &(0x7f0000005480)={0x2, 0x4e23, @multicast1}, 0x10) arch_prctl$ARCH_GET_GS(0x1004, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) dup2(0xffffffffffffffff, r4) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="18c18377381651f40aa76a85150dab1fd81d3423f4548d5709e4095abf7dd4390e4aef82f9d786756ea184f602d705e8df80a2621ee3a4eebb7fc70d8c38563c87596ac4dd7a7f5164c8859d00007fdc842e9fc6864b710dd1b51fbc51f72de99cf612005f5edff6d02793c9aa0407aab7f4983a401d82d41a5c0ce7893fdc962e3599c80b3959b85f5bd026e679a6a6675fb367ae99ca4140cf2fcd6819ccda"], 0x1}}, 0x44801) sendto$inet(r2, &(0x7f0000000400)="1c554cf8b93687aab173d8032491f239015b10fe50222ecdab43be4f8e44ebb3fd0953c47b4b239192db69ddbdf96044e77bcca1da6e934db89b0000000000000000", 0x42, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) socket$inet(0xa, 0x801, 0x0) ioctl$CAPI_GET_MANUFACTURER(0xffffffffffffffff, 0xc0104307, &(0x7f0000000040)=0x8d) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000002c0), &(0x7f0000000480)=0x4) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000540)="67855963fd963760af248522ee35e35c27679e6917d7630f8ad85375bc706c11ef62c906f233b254a7844444398e7d99fa8f236805dafd93d12066a1cb992838e5fbb5ede712e10b26b260fba1d32a0793d187f457b99eb35744d8a8bff3cf32cbbaea7d279eb07d78d9a90236171d7f532a0dffcda6afe3091f3c76c8554b7b1b27916d0c7a59d7ca48a1262bbedfea1116b3c44c4da89c4dc0922042257c4a25c03f3ebbe798f0a7fa42d3b417e5eeee0c6512d57dec6c1e76455c80fa5b8c87ccbfa86f86019d4d7a0347a19b4aec28d7fd3e1be890ab666138c24fd0dae7598966e3cddf7e113d2bb10896133af3002431bfb8eccb97a2") socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 08:51:46 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 119.875942][ T8324] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:51:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:46 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, 0xffffffffffffffff, 0x0) 08:51:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}]}, 0x5c}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:46 executing program 3: r0 = creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x841d1f75c9fea661) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000100), 0x1c) r3 = dup2(r2, r2) clone(0x3ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(r1, r0) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000200)={0x0, {{0x2, 0x0, @broadcast}}}, 0x88) ioctl$EVIOCGRAB(r0, 0x40044590, 0x0) 08:51:46 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x12140, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0cc5640, &(0x7f0000000140)={0x4, @pix={0x0, 0x400, 0x32315559, 0xd, 0x3, 0x9, 0x0, 0x100000001, 0x1, 0x4, 0x2, 0x5}}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) io_setup(0x3, &(0x7f0000000240)) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket(0x0, 0x805, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) 08:51:46 executing program 0: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000280)='./file0\x00') mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000300)='./file0\x00') pivot_root(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000180)=0xc) r1 = getegid() lchown(&(0x7f0000000000)='./file1\x00', r0, r1) 08:51:46 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, 0xffffffffffffffff, 0x0) 08:51:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x58}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:47 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, 0xffffffffffffffff, 0x0) 08:51:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x78, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x78}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) setuid(0xee01) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, 0x0) 08:51:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:47 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0xb4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}}]}]}, 0xb4}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) 08:51:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000240)="f2af91930f0124eda133fa20430fbafce842f66188d0c4e18014d3ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac462b99cbc0ce8000000c482310d46f449f216c863fa438036a966410f6c244dd68dbaa9f340ae955b375f420f383c02c401405c6bfdd70fc7f833fe0f8028ffffffab64e4660f38323c8fa1fe5ff6f6df0804f4c49ef8f840fc9c0f01c4288ba6452e00001ebdd4083644d923") 08:51:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x68, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}]}, 0x68}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000000000b000000400004001c0007000800040000000000080001000000000008000400000000000c00070008000400000000001400070008000100000000000800030000000000"], 0x1}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 08:51:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 08:51:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x68, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_BEARER={0x4}]}, 0x68}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 08:51:47 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102201ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) 08:51:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}}]}]}, 0xa8}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:47 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) getpgrp(0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:48 executing program 2: personality(0x1bb2baf3005ac137) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x70, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x70}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 121.331252][ T8483] Invalid argument reading file caps for ./file0 08:51:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:48 executing program 2: personality(0x1bb2baf3005ac137) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 121.462784][ T8494] Invalid argument reading file caps for ./file0 08:51:48 executing program 4: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000001c0)='./file1\x00', 0xc042, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000000)={'bcsf0\x00', 0x800}) 08:51:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) [ 121.587323][ T8501] Invalid argument reading file caps for ./file0 08:51:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000340)={"1bfd742475b4b25a0fe736e4af2cf22940531d3a07cfe17ad0b2f26315759da12f63c0674c557b7c154f7053c39b98402826a25b6825769e93df83d7e96b45feb1800bc893a4d772f957bb79fb4faac6357d56d0c841696c42f8670c2f0f7876d41fed76bf7ec621f4f7a0aad9d823be8b2bbd2206dffe8c6fb771c78a17ac7bd1296b395f0b516c55870faeef9f6b579a47adcc6428c27c84b9c6bef9d38b0d837258964ff950cdade4160be09b786eca0ba43244ec1678fdf498cadad843f61d3a7b62046448d7c6a23e419ded63781860c287a797c474522c4e704e7935cad5e920aa13957fb181e43ac10a87a93c5a4af821c846227b9470da0f607d9f08747c088b4074237ad13906e0087d3876b2270e56cc963dd796b47792d3a92751b37ac8ca71c64001186f5d2df8438c49265cd3532665cf21d4b5e5f0c30736bf949d8b583ffcd92616c34904ce2e565a686044ed4e6cea0d19ef706533f4897ebc94d145826ca816c636ff6a52bf5b44073b70898e276f63ae3c93d372ef8b72deb25d91dae6216cc762e26767ca13c04e9ade9d65bbf32ea6cc75a3c3674491c6e4cb26cda56b906ea409103fe186322c26bdd78a6920ba053f2b081e0ea0df1601e1ab4af58c2c37649a0b69d704f1b3ff7facd11011f8f0bd0279ab692b8377a8e206cf7ed20450e91ef813732983d8ea3b1a0aacd835be8138c0bf2c631d35fc9234472caac720dd6fea2fd953a4a0cc0b6dd4b67f0a6e965bd1a5594b80db04ac956cbdc87c12fe51280d07595181acb036cfea796debd265ae6506267e45d454f3ef697135e16dea1c96b56c708c30007fe08eacc3ee2c3d63d694777258dd84baa100c7faf54fd32091261ec9d2d9ced91464e678c9b99a15e0ef608aa7c7a2bdde09a385b31f90566f0b30b398810dc5b75184b44c4b3acbd3adc9c5415a6271413d2ded85614670f26d2e790e1cb493673611ad88d5b03920b7575b521a9c7d56508b15b1a5ea05e041cd2c0bd324e88a4981fce4a92c25231552d51b1f39dfb7227d677fff6bf11816c1c6ca2475462e92fb57bd16a717cb9f81acf631808a145a79861ad58d195c379b2d28d92fd7215ea4a7bcb9a849c272d071de1b2f0fd21c8d46acacd7f9be09d264e19e8c532d30311aa9606ea0a242d12f3ba256c3cb4f9bfa52259370350f4280c93ef61c3911e406a5bb7d4a9a35bee1ec95bb40f403097efdf40c46e10e0b299967335050dfd85dae6ce2a7c9b877d1449aa440a05565ffe826e792586c3986e67a1bc922ae2a783a9910535ea5cac45124da4dc290779a77955008f92a0731268648b0de2c4a47dcf6c779647becea0de06137000f4dd7e4884002f87bfb5e96c2a32ba5c5b4395244795cf56cb4acdf6965ffceacb5495ec61194ef37d6a170f9bc9e9aab502333f4a32f595da787"}) 08:51:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x44}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:48 executing program 2: personality(0x1bb2baf3005ac137) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x3a7) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000200)="18", 0x1) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0xfffffffffffffffe, 0x0) 08:51:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 121.814079][ T8519] Invalid argument reading file caps for ./file0 08:51:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") [ 121.990757][ T8540] Invalid argument reading file caps for ./file0 08:51:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r0, r1, 0x0, 0x2007ffffffe) getrusage(0x0, 0x0) 08:51:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x5c}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'ip6tnl0\x00', {0x2, 0x4e22, @local}}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) [ 122.164913][ T8551] Invalid argument reading file caps for ./file0 08:51:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2aa) sendmmsg(r0, &(0x7f000000df00)=[{{&(0x7f00000002c0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x3}}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0x10, 0x1, 0x4}], 0x10}}], 0x1, 0x0) [ 122.338207][ T8567] Invalid argument reading file caps for ./file0 08:51:49 executing program 3: 08:51:49 executing program 2: personality(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:49 executing program 0: 08:51:49 executing program 1: 08:51:49 executing program 5: socket$inet6(0xa, 0x1, 0x8010000000000084) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:49 executing program 2: personality(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:49 executing program 0: [ 122.513115][ T8581] Invalid argument reading file caps for ./file0 08:51:49 executing program 3: 08:51:49 executing program 1: 08:51:49 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:49 executing program 4: 08:51:49 executing program 0: 08:51:49 executing program 3: 08:51:49 executing program 2: personality(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:49 executing program 1: 08:51:49 executing program 4: [ 122.800242][ T8605] Invalid argument reading file caps for ./file0 08:51:49 executing program 1: 08:51:49 executing program 3: 08:51:49 executing program 2: personality(0x1bb2baf3005ac137) mkdir(0x0, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:49 executing program 0: 08:51:49 executing program 5: open(0x0, 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:49 executing program 4: 08:51:49 executing program 3: 08:51:49 executing program 1: 08:51:49 executing program 0: 08:51:49 executing program 4: 08:51:49 executing program 2: personality(0x1bb2baf3005ac137) mkdir(0x0, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:49 executing program 5: open(0x0, 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:49 executing program 1: 08:51:49 executing program 3: 08:51:49 executing program 0: 08:51:50 executing program 4: 08:51:50 executing program 1: 08:51:50 executing program 2: personality(0x1bb2baf3005ac137) mkdir(0x0, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:50 executing program 5: open(0x0, 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:50 executing program 4: 08:51:50 executing program 0: 08:51:50 executing program 3: 08:51:50 executing program 1: 08:51:50 executing program 4: 08:51:50 executing program 3: 08:51:50 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:50 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:50 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="080104023f020000470300007f00000082020000000001000000000000000000b63e39a90a8ec59f83eb"], 0x2a) 08:51:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0xa4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}}]}]}, 0xa4}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:50 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000070000001c0009000800020000000000080001000000000008000100000000000c00020008000200000000001400010008000300000000000800030000000000"], 0x1}}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5c") 08:51:50 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:50 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:50 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x2000, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) unshare(0x600) socket$inet6(0xa, 0x0, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "07424a0ea015311c7227c3b6cf6e8eca17c435a81eb8c1fff4fc3bb9394c465c", 0x97, 0x502f, 0x3, 0x9, 0x210}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x3, 0x0) setsockopt$inet_buf(r0, 0x0, 0x26, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0xa180, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x25) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000100)={{0x10001, 0x4, 0x6, 0x5, 0x3ff, 0x6}, 0x6}) uname(&(0x7f0000000300)=""/66) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000200), 0x4) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$VIDIOC_G_EDID(r0, 0xc0285628, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240)=0x55, 0x4) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, 0x0) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000000)={{}, {0xf}}) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) 08:51:50 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:50 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80, 0x234002) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0x80000000, &(0x7f0000000080)=0x2) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, 0x0, 0x0) 08:51:50 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:50 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:50 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xb3fe, 0x208000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f00000000c0)={{0x7fffffff, 0xd03}, 'port0\x00', 0x50, 0x111000, 0xff, 0x0, 0x9, 0x2, 0x1f, 0x0, 0x1, 0xfffffffffffff31e}) syz_emit_ethernet(0x3d9, &(0x7f0000000000)={@random="cd38ffe40f97", @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x40000000003a, 0x0, @ipv4={[], [], @broadcast}, @mcast2, {[], @icmpv6=@mld={0x2, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}}}}, 0x0) 08:51:50 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000040), 0x4) r1 = dup(r0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000080)={[{0x7f, 0x2, 0x4, 0x10000, 0x37ad, 0x800, 0x5, 0x40, 0x3, 0x8, 0x7, 0x0, 0x3}, {0x1, 0xa5f, 0x3, 0x1, 0x7, 0x9, 0x80, 0x1000, 0x10001, 0x4, 0xa1, 0x7ff, 0x2cb5}, {0x1, 0x3, 0x1fe000, 0x1000, 0x40, 0xb300000000000, 0x0, 0x7, 0x4, 0x4, 0x7, 0x400, 0xc177}], 0x10000}) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) 08:51:51 executing program 3: r0 = socket(0x10, 0x80003, 0x0) write(r0, &(0x7f00000000c0)="240000001a0025f0006bb4f7fdff141c020b5aff6e10b500000780cc0800090006000000", 0x24) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x71f, 0x4) 08:51:51 executing program 4: pipe(0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0xc3}, 0x8) r1 = syz_open_dev$sndpcmp(0x0, 0x200, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) read$rfkill(r1, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\r\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\n\x00\n\x06!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 08:51:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x682001) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000080)={0x0, 0xa0d, 0x2, 0x1, &(0x7f0000003000/0x2000)=nil, 0x8}) io_submit(r1, 0x2, &(0x7f00000003c0)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000000c0)) 08:51:51 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:51 executing program 1: clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x5) add_key(&(0x7f0000000880)='keyring\x006\xf9\x12l\x12\x05O\\\x0e\x18\xc6R%s\xddy\xf1\xa0\xa3\xa6\tW\xd6\xc7)\xad\x85l\xd8\xf0\xdf\x9c\x04\xd1\x8eW\x90K\x1c\x05 \x9d\xee\x12\xf5\xcc\xc1-\x98\xa7\x007g46a\x0f\xaa\xc8\x8b\xcf\x96\x81\x91\x87\x89\xc2\xadG6e\x98K\x17\x86\x8d\x9c^\x90\x81>\x9e\xc1\xf7?\xde\xbfV8\xf9\xc0\x1f\x88!\xf1\xf7\x8e\xba\xc9\x84\xe3\x85.\xe1\x00'/123, 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 08:51:51 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:51 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) [ 124.355557][ T8735] bond0: Releasing backup interface bond_slave_1 08:51:51 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4018641b, &(0x7f0000000040)={0x0, 0x5, 0x3, 0x12, &(0x7f0000ff9000/0x4000)=nil, 0x321}) clock_getres(0xa, 0x0) 08:51:51 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 08:51:51 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:51 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) mmap(&(0x7f0000867000/0x3000)=nil, 0x3000, 0x4004, 0x10, r0, 0xffffffffffffffff) setsockopt$RDS_FREE_MR(r0, 0x114, 0x6, &(0x7f0000000100), 0x10) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x1b0, r2, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xd861}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbf40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}]}, @TIPC_NLA_LINK={0x13c, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xad5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3a57}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3e4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2d}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7ff}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) 08:51:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 08:51:51 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) readv(r0, &(0x7f00000013c0)=[{&(0x7f00000001c0)=""/209, 0xd1}], 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000040)={0x0, 0x0, 0x10002, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0086438, &(0x7f0000000080)={0x3, r1}) [ 124.974951][ T8748] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 124.989368][ T8748] bond0: Releasing backup interface bond_slave_1 08:51:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = pkey_alloc(0x0, 0x2) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x80, 0xa00) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21, 0xfffffffffffffff9, @empty, 0xd4b1}, 0x1c) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, r1) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) 08:51:51 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 08:51:51 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = dup2(r0, r1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000)=0x1, 0x4) r3 = dup3(r1, r0, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000040)=0x7fd, 0x4) setsockopt$inet_dccp_int(r3, 0x21, 0x17, &(0x7f0000000100)=0x8, 0x4) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0245629, &(0x7f00000000c0)={0x0, 0x1, 0x2, [], &(0x7f0000000080)=0x1}) sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x4e24}, 0x10) 08:51:51 executing program 3: r0 = socket$inet(0x2, 0x1, 0x10001) sendto$inet(r0, &(0x7f0000000200)="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", 0x16b, 0x48050, &(0x7f00000000c0)={0x2, 0x200000000004e23, @loopback}, 0xfffffffffffffe21) r1 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) accept4$inet(r1, 0x0, &(0x7f0000000000), 0x80000) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f00000001c0)) 08:51:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000040)=@pppoe, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000140)=""/210, 0xd2}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000240)=""/139, 0x8b}], 0x4}, 0x100) [ 125.101698][ T8735] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:51:51 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0xa504, @empty, 0x5}}, [0x4, 0x7fff, 0x8, 0x6, 0x9d3e, 0x40, 0x80000000, 0x800, 0x5, 0x100000000, 0x7, 0x6, 0xffff, 0x1, 0x8000]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)={r1, 0x13, 0xc7, "fced1564dd10b03af6419f25c29ad7deca2657ee2a23df1a408d4ca16cff1ea2909f449b5369ea5d082e4d886de155e6d02dcc1be0c7696142ec51b73ed170225ad59f6a72f2decfb02887ae5c002c9d90c9e392273988985bf55668eb65b2ad78310eb7197f677b4d0dc7e8f6ba16b640997b3edd019439e8881c3b4d383ab1bfdcc584258a50748f358f0d79e50fa67f65ad9ba12be6320988f75555cfeb6d7450fb3605710459a1025f6ed388364b4fbf84a3c46f3f0cda3e562483296f0b2dba53fb5e8013"}, 0xcf) r2 = socket$inet_tcp(0x2, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40040, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000480)={{}, {0x20000000304, @link_local}, 0x0, {0x2, 0x0, @empty}, 'lapb0\x00'}) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @empty}, {0x0, @remote}, 0x0, {0x2, 0x0, @broadcast}, 'gretap0\x00'}) 08:51:51 executing program 1: r0 = socket(0x0, 0x0, 0x5) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e22, @local}], 0x10) fcntl$getown(r0, 0x9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 08:51:51 executing program 4: keyctl$session_to_parent(0x12) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x10000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x7fff, 0xac4, 0x4f5, 0x8}, 0x14) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000180)=0x5, &(0x7f00000001c0)=0x4) getpgrp(0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x1, 0x10001, 0x5, 0x2, 0x0, 0x8, 0x20, 0x8, 0xffffffffffffffff, 0x7f, 0x6aa, 0x7, 0x2, 0x2, 0x101, 0x5, 0x9000, 0xffffffff, 0x7fff, 0x2cf, 0x800, 0x1ff, 0x100000000, 0x1, 0x5, 0x1, 0x400, 0x67, 0x85b, 0x7, 0x3, 0x9, 0x3, 0x6, 0xae9f, 0x3, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x800, 0xfff, 0x400, 0x0, 0x0, 0xcea00000000, 0x99fd}, r1, 0x5, r0, 0x3) kcmp(r1, r1, 0x5, r0, r0) 08:51:52 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 08:51:52 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 08:51:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000140)={'hsr0\x00', @ifru_names='lo\x00\x00\x00\x00\x00\x00\x00\x04\x00'}) 08:51:52 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x10, r0, 0x0) 08:51:52 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x24280, 0x0) write$P9_RSTAT(r2, &(0x7f0000000040)={0x4b, 0x7d, 0x2, {0x0, 0x44, 0x5, 0x80000000, {0x81, 0x1}, 0x100000, 0x7, 0x0, 0x400, 0x9, 'skcipher\x00', 0x0, '', 0x0, '', 0x8, '&userem0'}}, 0x4b) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x202, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 08:51:52 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:52 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000000000e2ffffff00cadda58158c59a8171db2e"], 0x10}, 0x0) 08:51:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000022c0)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}], 0x1, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.syz\x00', &(0x7f0000000080), 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x80, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='attr/current\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x4800) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x400000, 0x0) 08:51:52 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x10, r0, 0x0) 08:51:52 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:52 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x88100) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000100)) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000240)='t\bu\x00\x00\x01\x00\x00\x8c\x0f\x00\x00\x00\x00\x88\xcb&\x96}\xdb\xfb\xe4\x1e\xb0\xde\x1c\x0f\t\x92<\xe7#\x04n\xcfc\x1a\xdfI\xd1\xb9\xb1\xe1\xea8\xe2g|\x96\xb3\xa7!\x1d}\xe7\x81\xb3\x86\x19\xd7\\\xc4\xe7\xcb\x9f\x91\xa4\x84EH\x0f\xf3E=\xb2\x9bt\x1a\xf06r9:\xea\x13WaHSa\x8a\xf8\xd6YF\xb9c\x18)\xadG\xa7\xfa\xc00\xd1\x84\xd8\xafP\v\x16\xb2\x92\x92\xabX/\xf1\x9cRp0\x02ye\xe5l`\xfdm\x12\xa7\x84\x9a\xe8\x11\xf7#\xd3Q\x0f\x002\xba\xa1\x11\xbf\x1b\x19\xf6\xac$Rj\x88\xc0\xd7\x1ca \x98\xe9w\xcb+\x7f\r\xdc\x1b\x1au\xdfK\xb43}\xba2\x8f\x03\xbaX\xeah\xce\xd8K\xfa\x90\xa7A\xed\xfbf\xd1', 0x0) dup2(r2, r1) 08:51:52 executing program 1: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) listen(r0, 0x0) r1 = accept4(r0, &(0x7f0000000400)=@un=@abs, &(0x7f0000000040)=0xfffffffffffffecd, 0x800) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaa0000010000000000069078ac69e25804d618ab9a004e20", @ANYRES32=0x42424242, @ANYRES32=0x42424242, @ANYBLOB="866608018027b232537f4481add1712a5011000090780000"], 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', r2}) 08:51:52 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x880, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000580)={"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"}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='io\x00') nanosleep(&(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f00000001c0)) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000040)=""/245, 0x5a}], 0x1, 0x0) 08:51:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) mq_unlink(&(0x7f0000000000)='/dev/btrfs-control\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x8138ae83, &(0x7f0000000300)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$KVM_SET_PIT(r4, 0x8048ae66, &(0x7f0000000240)={[{0x1, 0x4, 0xffffffffffff8000, 0x4, 0x80000000, 0x10000, 0x90a, 0x2, 0x7, 0x7fffffff, 0x9623, 0x80, 0x5}, {0xfffffffffffff218, 0x800, 0x4, 0x1, 0xff, 0xa45, 0x6, 0x6, 0xd91, 0x5, 0x2, 0x3, 0x20a59222}, {0x9, 0x9, 0x10001, 0x200000000, 0x8, 0x0, 0x24, 0x7fff, 0x8001, 0x400, 0x8001, 0x81, 0x3}], 0xffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) select(0x40, &(0x7f0000000040)={0x5, 0x7, 0x7, 0x100000000000000, 0x1, 0x367e, 0x6, 0xc8f}, &(0x7f0000000080)={0x8e9, 0x200, 0x5, 0x2a, 0x101, 0x3, 0x80000000, 0x81}, &(0x7f00000000c0)={0x4, 0x1, 0x4000000000000000, 0x7fffffff, 0x8, 0x1ff, 0x7, 0x101}, &(0x7f0000000180)={0x0, 0x2710}) 08:51:52 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x10, r0, 0x0) 08:51:52 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x3, 0x10000}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={r0}) open_by_handle_at(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="9c00000000080000ad2c03fec979fb46ac950bce4447b5665e246686a76d863682e8cca941ee088959fa9c1549fc8cc3d51d97e7480d7b30ef547f12ca7e03a4c1a54bb2545dc5fdcac36208f0fa0b9cf6a73d462a9207fea051f1fc73fe21eba2e7939359ee81816bf26ee6ea62247c55b6f536df828ffbcdc6c3e3ea42be579076f7dfcf0836056d88d55bb29880c4ae9e86b41ee495a026a2ad1184683f6f1d09617150ecdaca1767b8408455bcfdc18bfb73346e7e61ef6195b30dca8b5cfbf77ec2335e39d790cdaa25a69660e70e89753fa7685ca02fc4165c59447f5d4d949d"], 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f0000000080)=ANY=[@ANYBLOB="070000000000000004000000000000000900000000000000feffffffffffffff03000000000000000900060400000010000000000000000000000000000000000000000000000000000000000000000086db000000000000fbffffffffffffff06000000000000001f00008000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000060000000000000001010804000000000000000000000000000000000000000000000000f9ffffff00000000000000000200000000000000020000000000000003000000000000008025040100"/272]) 08:51:52 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000800)=[0x0]) 08:51:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000080)) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x20000) 08:51:53 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, 0xffffffffffffffff, 0x0) 08:51:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000015c0)=0xe8) bind$packet(r1, &(0x7f0000001600)={0x11, 0x9, r2, 0x1, 0x5, 0x6, @local}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x7}, 0x14) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x8}, 0x10) 08:51:53 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, 0xffffffffffffffff, 0x0) 08:51:53 executing program 4: syz_execute_func(&(0x7f00000003c0)="f2ae91cd800f0124eda133fa20430fbafce842f66188d0c4ab5bf9e2f9e2c7c7e4c653fb0fc4014cb63a3af4a95bf9c44149f2168f480817eebce000008020080063fa43adc4e17a6fe60f186746f340aee47c7c730f66400f3833448dbd448dbd14e7e701fe5ff6e7df660fe7af5cc34a510804f4c401f882609c8b42a8002d00002d00") r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x428b3082, 0x40000) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000100)) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0xd, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000140)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000080)) 08:51:53 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x2a, &(0x7f000002eff0)={0x0, 0x0}, 0x8) 08:51:53 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendmmsg(r0, &(0x7f000000be40)=[{{&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, 0x0}}], 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xff, 0x100) ioctl$sock_ifreq(r1, 0x8944, &(0x7f0000000180)={'tunl0\x00', @ifru_addrs=@l2={0x1f, 0x100000001, {0x2, 0x4, 0x40e, 0x1e, 0x3, 0x1}, 0x34, 0x5}}) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000100)=""/93) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80000) 08:51:53 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(0x0, 0x0, &(0x7f0000000800)=[0x0]) 08:51:53 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, 0xffffffffffffffff, 0x0) 08:51:53 executing program 3: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x3, 0x13012, r0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x4, &(0x7f00000000c0)=0x2) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) faccessat(r1, &(0x7f0000000400)='./file0\x00', 0x7, 0x0) 08:51:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000080)) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000300)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x20000) 08:51:53 executing program 4: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x75c8cb4554c3e6fd, 0x0) write$P9_RREADDIR(r1, &(0x7f00000001c0)={0xc5, 0x29, 0x2, {0x7, [{{0x8, 0x2, 0x1}, 0x3ff, 0x4, 0x7, './file0'}, {{0x8a, 0x0, 0x5}, 0x0, 0x3f, 0x7, './file0'}, {{0x0, 0x3, 0x3}, 0x1f, 0x5, 0x7, './file0'}, {{0x1e, 0x2, 0x5}, 0x2, 0x609bfc23, 0x7, './file0'}, {{0x4, 0x4, 0x2}, 0x7, 0x1, 0x7, './file0'}, {{0x9, 0x0, 0x4}, 0x800, 0x3, 0x7, './file0'}]}}, 0xc5) accept4$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e, 0x80800) sendmmsg(r0, &(0x7f0000005240)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x0, 0x2}}, 0x80, 0x0, 0x0, &(0x7f0000000680)=[{0xc4, 0x119, 0x9, "3e5f887af12b2dde34713dea7010db06acff2ae48697f99ccec4604d64803f28a4b17398ceff1e1403a9b235f990b5097be5e8f49be1d52b80107ae1c36c60c21ddb90ca5b3805a59977bddadd38bd7d324dd9ea71c9c343fcb1975f2ed8e5aa368d4d368f1ee1125c4023f017ec82cd4bcd0658a4a7200dffcfa1f5ee10e1db9d1207940b189ff46304dee39ff78cbdc42fc9bc04a44ad299ea9b68118e80e5eceb4fdb9d851b2a4f5cbc5c6d54fddc815286ee4c"}], 0xc4}, 0xdb}, {{0x0, 0x0, &(0x7f0000000bc0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x1}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000c80)}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)}, 0x2}], 0x4, 0x600) 08:51:53 executing program 2 (fault-call:4 fault-nth:0): personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:53 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(0x0, 0x0, &(0x7f0000000800)=[0x0]) 08:51:53 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/4096) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) 08:51:53 executing program 1: fstat(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() getresgid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)=0x0) fstat(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000300)=[r0, r1, r2, r3, r4, r5, r6]) r7 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x8, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r7, 0xc02c564a, &(0x7f0000000040)={0x8000, 0x32525942, 0x0, @stepwise}) [ 126.972266][ T8959] FAULT_INJECTION: forcing a failure. [ 126.972266][ T8959] name failslab, interval 1, probability 0, space 0, times 1 [ 127.033257][ T8959] CPU: 0 PID: 8959 Comm: syz-executor.2 Not tainted 5.1.0+ #5 [ 127.040770][ T8959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.050831][ T8959] Call Trace: [ 127.054165][ T8959] dump_stack+0x172/0x1f0 [ 127.058520][ T8959] should_fail.cold+0xa/0x15 [ 127.063134][ T8959] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 127.063212][ T8959] ? ___might_sleep+0x163/0x280 [ 127.063232][ T8959] __should_failslab+0x121/0x190 [ 127.063247][ T8959] should_failslab+0x9/0x14 [ 127.063260][ T8959] kmem_cache_alloc+0x2b2/0x6f0 [ 127.063273][ T8959] ? kasan_check_read+0x11/0x20 [ 127.074049][ T8959] vm_area_dup+0x21/0x170 [ 127.074066][ T8959] __split_vma+0xad/0x570 [ 127.074080][ T8959] ? find_vma+0x30/0x170 [ 127.074095][ T8959] __do_munmap+0x2ef/0xef0 [ 127.074119][ T8959] ? arch_get_unmapped_area+0x620/0x620 [ 127.115971][ T8959] mmap_region+0x227/0x1770 [ 127.120459][ T8959] ? _kstrtoul+0x170/0x170 [ 127.124950][ T8959] ? __x64_sys_brk+0x760/0x760 [ 127.129707][ T8959] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 127.135930][ T8959] ? get_unmapped_area+0x295/0x3b0 [ 127.141025][ T8959] do_mmap+0x8e2/0x1080 [ 127.145168][ T8959] vm_mmap_pgoff+0x1c5/0x230 [ 127.149753][ T8959] ? vma_is_stack_for_current+0xd0/0xd0 [ 127.155280][ T8959] ? ksys_dup3+0x3e0/0x3e0 [ 127.159685][ T8959] ksys_mmap_pgoff+0x4aa/0x630 [ 127.164434][ T8959] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 127.170050][ T8959] ? rcu_read_lock_sched_held+0x110/0x130 [ 127.175752][ T8959] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 127.181991][ T8959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 127.187430][ T8959] ? do_fast_syscall_32+0xd1/0xd54 [ 127.192523][ T8959] ? entry_SYSENTER_compat+0x70/0x7f [ 127.197790][ T8959] __ia32_sys_mmap_pgoff+0xdd/0x1a0 [ 127.202974][ T8959] do_fast_syscall_32+0x281/0xd54 [ 127.207985][ T8959] entry_SYSENTER_compat+0x70/0x7f [ 127.213089][ T8959] RIP: 0023:0xf7f1e849 [ 127.217146][ T8959] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 127.236730][ T8959] RSP: 002b:00000000f5d1a0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000c0 [ 127.245128][ T8959] RAX: ffffffffffffffda RBX: 0000000020ffb000 RCX: 0000000000001000 [ 127.253103][ T8959] RDX: 0000000000000009 RSI: 0000000000000011 RDI: 0000000000000004 [ 127.261147][ T8959] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 127.269106][ T8959] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 08:51:54 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(0x0, 0x0, &(0x7f0000000800)=[0x0]) 08:51:54 executing program 0: r0 = request_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='/dev/video#\x00', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, r1) r2 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_G_TUNER(r2, 0xc054561d, &(0x7f0000000000)={0x0, "4b1dcbbf2a00f6345dfddaf9838c0682c1982f74f55a88aa001a38b4cd44ca04"}) [ 127.277063][ T8959] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:51:54 executing program 2 (fault-call:4 fault-nth:1): personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:54 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:51:54 executing program 1: clock_nanosleep(0xb, 0x0, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/packet\x00') write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)={0x2d, 0x4, 0x0, {0x0, 0x100, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80000, 0x0) fcntl$setpipe(r1, 0x407, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000040)=[0x342, 0x80]) 08:51:54 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x2f) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x7) getsockname$packet(0xffffffffffffffff, &(0x7f0000001700)={0x11, 0x0, 0x0}, &(0x7f0000001740)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000001780)={@loopback, 0x45, r1}) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="fc1229cad6e84097cbb7a7bb5d8fc3a16748920a51f5f8d4287299b01b109819dcc4d533b2ea8a0d506f9d1612508766254b8a5bc4096b2f8289ab22cf8ed73b5db3aaa995c93b71a08a558eff8be5550ee4e7", 0x53, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000180)={r2, 0x4, 0x10000}, &(0x7f00000001c0)={'enc=', 'pkcs1', ' hash=', {'nhpoly1305-sse2\x00'}}, &(0x7f0000000280)="a29273e1571a33d493c4341bb0ce195b094470a6bbb9aae1cfa781790fc4a27f6a2e8905467bf801fe37c9b0dcf6e32f75f1aa7baea6c7a16ce0c0a7fb214d34c3cd036d348556a2d39f74faa4271b0558aa62f7d0c9fe6c886d589d4361e941e68cdf85622e864df559a3db1ac01b7a25b3948f3411674ca53b2368ce38cee30f22df490a98500343193ea28ab3bd05854544a49b78306ab8528f2575c39bd61765cfa05d44d0a0487ad2b73a5f6600051925d8454f09cdba4627192706fe43109ab7feaea97e39155f9d2390", &(0x7f0000000380)=""/56) connect$inet6(r0, &(0x7f0000000080), 0x1c) 08:51:54 executing program 0: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000000)=""/12, &(0x7f0000000040)=0xc) [ 127.433365][ T8983] Unknown ioctl 1074283780 [ 127.459984][ T8985] Invalid argument reading file caps for ./file0 [ 127.483498][ T8993] FAULT_INJECTION: forcing a failure. [ 127.483498][ T8993] name failslab, interval 1, probability 0, space 0, times 0 [ 127.507842][ T8993] CPU: 0 PID: 8993 Comm: syz-executor.2 Not tainted 5.1.0+ #5 [ 127.516220][ T8993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.526288][ T8993] Call Trace: [ 127.529599][ T8993] dump_stack+0x172/0x1f0 [ 127.533946][ T8993] should_fail.cold+0xa/0x15 [ 127.538583][ T8993] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 127.544558][ T8993] __should_failslab+0x121/0x190 [ 127.549484][ T8993] should_failslab+0x9/0x14 [ 127.553971][ T8993] kmem_cache_alloc+0x47/0x6f0 08:51:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = add_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="88e736fae7187d6357e7ad4aa33d001839e127b4828746342b059ee83796a948211670813f00ac860f48e4ca022ee2e78de02278414138cbb4f7f7ee784f70116628630c8de35ad544904c3a7c60f917ab006e4746793e4ff9132c1997f063823ec192fc0e9d9f0dff38d882c117ee4d727d19c418d433d923131123af7ff2f854a3840fbe2d0b665505f8108ba94eb8e14ccd9f6c8d60421ac4ba1c907f48110b91a8f757a621149d259a32d4", 0xad, 0xfffffffffffffffd) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='TPROXY\x00', r1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) 08:51:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3000000012000105000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="000000000000000010002e00080001bf736974000400020038b21560665e72ad794d43a5ec5d799a89dd129fc0da145b25a2f1f962e23094887df209968f833351ce2370a1e3cc46a9e4e021e081062748841cd2a719884470ab5a50906b39dae2a9fccb3fbc4519318fa433a8bea82f3e34395fb5da0bd2f6357142a0976df34b3bada3d373cf33cf7e3b598bbe540a349f0ae06c3ebd44aa45bab7c4309d1048147af2fb361832117d81a6c25db3a37e0fcff857c34af39e8f2a841d43fbdb942c62ce698db8ae1c73751a0640114cdf435601d501200e82ad08ac0bee326e"], 0x30}}, 0x0) [ 127.558718][ T8993] ? vm_area_dup+0x21/0x170 [ 127.563225][ T8993] ? rcu_read_lock_sched_held+0x110/0x130 [ 127.568964][ T8993] anon_vma_clone+0xde/0x480 [ 127.573590][ T8993] __split_vma+0x180/0x570 [ 127.578019][ T8993] ? find_vma+0x30/0x170 [ 127.582271][ T8993] __do_munmap+0x2ef/0xef0 [ 127.586696][ T8993] ? arch_get_unmapped_area+0x620/0x620 [ 127.592249][ T8993] mmap_region+0x227/0x1770 [ 127.596744][ T8993] ? _kstrtoul+0x170/0x170 [ 127.596766][ T8993] ? __x64_sys_brk+0x760/0x760 [ 127.596783][ T8993] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 127.596800][ T8993] ? get_unmapped_area+0x295/0x3b0 [ 127.612189][ T8993] do_mmap+0x8e2/0x1080 [ 127.612214][ T8993] vm_mmap_pgoff+0x1c5/0x230 [ 127.626989][ T8993] ? vma_is_stack_for_current+0xd0/0xd0 [ 127.627004][ T8993] ? ksys_dup3+0x3e0/0x3e0 [ 127.627027][ T8993] ksys_mmap_pgoff+0x4aa/0x630 [ 127.627046][ T8993] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 127.643231][ T9001] netlink: 'syz-executor.4': attribute type 46 has an invalid length. [ 127.647440][ T8993] ? __ia32_sys_read+0xb0/0xb0 08:51:54 executing program 4: r0 = socket(0x15, 0x805, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) rmdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="5a6ba159f88241fa33f66928d6ee9816717637def1fe6fb87de94203a38ab81092d71a2f2294515f3ca98e9568dbb84d2ede22d700b49ff38a47420760665d53d3ff0162aae996498ad1a7bc7a3551acf90b7f258272ee842cfad382becbb95f5cb5b1c3ca9cc6"], 0x0, &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000040)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) umount2(&(0x7f00000002c0)='./file0/file1/file0\x00', 0x3fffffffffffffc) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) setxattr$security_ima(&(0x7f0000000140)='./file0/file1/file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000280)=@md5={0x1, "4190e9938f6da58cc166e3f5bef0254e"}, 0x11, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x0, 0x0) listxattr(&(0x7f0000000200)='./file0/file1\x00', &(0x7f00000003c0)=""/226, 0xffffffffffffff6c) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) rmdir(&(0x7f0000000180)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0x1aa, 0xfa00, {0xffffffffffffffff, 0x765}}, 0x10) getsockopt(r0, 0x114, 0x8, 0x0, &(0x7f000033bffc)) [ 127.647456][ T8993] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 127.647471][ T8993] ? do_fast_syscall_32+0xd1/0xd54 [ 127.647487][ T8993] ? entry_SYSENTER_compat+0x70/0x7f [ 127.647504][ T8993] __ia32_sys_mmap_pgoff+0xdd/0x1a0 [ 127.647526][ T8993] do_fast_syscall_32+0x281/0xd54 [ 127.667072][ T9001] netlink: 'syz-executor.4': attribute type 46 has an invalid length. [ 127.671127][ T8993] entry_SYSENTER_compat+0x70/0x7f [ 127.671139][ T8993] RIP: 0023:0xf7f1e849 [ 127.671170][ T8993] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 127.723541][ T8993] RSP: 002b:00000000f5d1a0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000c0 [ 127.723559][ T8993] RAX: ffffffffffffffda RBX: 0000000020ffb000 RCX: 0000000000001000 [ 127.723565][ T8993] RDX: 0000000000000009 RSI: 0000000000000011 RDI: 0000000000000004 [ 127.723572][ T8993] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 08:51:54 executing program 5 (fault-call:2 fault-nth:0): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:51:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001500192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000140)={'vcan0\x00', 0x2}) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000080)={0x88, "19da93e4cfd0c87ab961d2438036115761c544cc576201c4dbde0cdbcb2cd4dd3a8b70bab6c13b1bb3def90da966f7d32d7196d64b52e7c80579d3f394bc12e5291ca1ba13889059991ffd04e782695109f6937b2239ed8c6f041f37b71dfee2dd75d42299966170643f65bbefad998927f9cad1f044e751a2c20e34ec77dd7a79b91e044c0081fb"}) 08:51:54 executing program 0: r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_CROPCAP(r0, 0xc0cc5640, &(0x7f0000000000)={0x9}) 08:51:54 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="10c804d49ff8", @local={0xac, 0x14, 0x0}, @remote, @loopback}}}}, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080), 0x2) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x0, 0xed2, 0x392}) [ 127.723580][ T8993] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 127.723596][ T8993] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 127.796382][ T9011] FAULT_INJECTION: forcing a failure. [ 127.796382][ T9011] name failslab, interval 1, probability 0, space 0, times 0 [ 127.815688][ T9011] CPU: 1 PID: 9011 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 127.823189][ T9011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.833251][ T9011] Call Trace: [ 127.836557][ T9011] dump_stack+0x172/0x1f0 [ 127.840901][ T9011] should_fail.cold+0xa/0x15 [ 127.845504][ T9011] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 127.851328][ T9011] ? ___might_sleep+0x163/0x280 [ 127.856210][ T9011] __should_failslab+0x121/0x190 [ 127.861171][ T9011] should_failslab+0x9/0x14 [ 127.865683][ T9011] kmem_cache_alloc+0x2b2/0x6f0 [ 127.870536][ T9011] ? fput+0x1b/0x20 [ 127.874348][ T9011] ? ksys_write+0x1cf/0x290 [ 127.878862][ T9011] getname_flags+0xd6/0x5b0 [ 127.883375][ T9011] ? entry_SYSENTER_compat+0x70/0x7f [ 127.888674][ T9011] getname+0x1a/0x20 [ 127.892580][ T9011] __ia32_compat_sys_execve+0x72/0xc0 [ 127.897964][ T9011] do_fast_syscall_32+0x281/0xd54 [ 127.903001][ T9011] entry_SYSENTER_compat+0x70/0x7f [ 127.908116][ T9011] RIP: 0023:0xf7f98849 08:51:54 executing program 2 (fault-call:4 fault-nth:2): personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000780)={0x14, 0x23, 0x1, 0x0, 0x0, {0x5801}}, 0x14}}, 0x0) close(r0) 08:51:54 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x81, 0x0) write$capi20_data(r0, &(0x7f0000000040)=ANY=[], 0x73d48794) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) write$FUSE_LK(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, {{0x0, 0xffffffffffffffff}}}, 0x28) tkill(r1, 0x8001004000000016) 08:51:54 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/150, 0x96}, {}, {&(0x7f00000001c0)=""/35, 0x23}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x4) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f00000000c0)=""/6) [ 127.912198][ T9011] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 127.931815][ T9011] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 127.931830][ T9011] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 127.931837][ T9011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 127.931844][ T9011] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 127.931851][ T9011] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 127.931857][ T9011] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 127.993734][ T9022] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 08:51:54 executing program 5 (fault-call:2 fault-nth:1): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 128.017720][ T9025] FAULT_INJECTION: forcing a failure. [ 128.017720][ T9025] name failslab, interval 1, probability 0, space 0, times 0 [ 128.083399][ T9025] CPU: 0 PID: 9025 Comm: syz-executor.2 Not tainted 5.1.0+ #5 [ 128.088555][ T9021] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 128.090909][ T9025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.090916][ T9025] Call Trace: [ 128.090937][ T9025] dump_stack+0x172/0x1f0 [ 128.090959][ T9025] should_fail.cold+0xa/0x15 [ 128.102657][ T9036] FAULT_INJECTION: forcing a failure. [ 128.102657][ T9036] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 128.110728][ T9025] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 128.141837][ T9025] ? ___might_sleep+0x163/0x280 [ 128.146684][ T9025] __should_failslab+0x121/0x190 [ 128.151613][ T9025] should_failslab+0x9/0x14 [ 128.156108][ T9025] kmem_cache_alloc+0x2b2/0x6f0 [ 128.160965][ T9025] vm_area_dup+0x21/0x170 [ 128.165298][ T9025] __split_vma+0xad/0x570 [ 128.169628][ T9025] ? find_vma+0x30/0x170 [ 128.173951][ T9025] __do_munmap+0x368/0xef0 [ 128.178357][ T9025] ? arch_get_unmapped_area+0x620/0x620 [ 128.183920][ T9025] mmap_region+0x227/0x1770 [ 128.188415][ T9025] ? _kstrtoul+0x170/0x170 [ 128.192828][ T9025] ? __x64_sys_brk+0x760/0x760 [ 128.197583][ T9025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 128.203817][ T9025] ? get_unmapped_area+0x295/0x3b0 [ 128.208921][ T9025] do_mmap+0x8e2/0x1080 [ 128.213074][ T9025] vm_mmap_pgoff+0x1c5/0x230 [ 128.217667][ T9025] ? vma_is_stack_for_current+0xd0/0xd0 [ 128.223203][ T9025] ? ksys_dup3+0x3e0/0x3e0 [ 128.227620][ T9025] ksys_mmap_pgoff+0x4aa/0x630 [ 128.232378][ T9025] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 128.238005][ T9025] ? __ia32_sys_read+0xb0/0xb0 [ 128.242762][ T9025] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 128.248313][ T9025] ? do_fast_syscall_32+0xd1/0xd54 [ 128.253416][ T9025] ? entry_SYSENTER_compat+0x70/0x7f [ 128.258695][ T9025] __ia32_sys_mmap_pgoff+0xdd/0x1a0 [ 128.263886][ T9025] do_fast_syscall_32+0x281/0xd54 [ 128.268906][ T9025] entry_SYSENTER_compat+0x70/0x7f [ 128.274003][ T9025] RIP: 0023:0xf7f1e849 [ 128.278063][ T9025] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 128.297652][ T9025] RSP: 002b:00000000f5d1a0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000c0 [ 128.306049][ T9025] RAX: ffffffffffffffda RBX: 0000000020ffb000 RCX: 0000000000001000 [ 128.314007][ T9025] RDX: 0000000000000009 RSI: 0000000000000011 RDI: 0000000000000004 [ 128.321968][ T9025] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 128.329929][ T9025] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 128.337887][ T9025] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 128.347380][ T9036] CPU: 1 PID: 9036 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 128.354845][ T9036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.364907][ T9036] Call Trace: [ 128.368214][ T9036] dump_stack+0x172/0x1f0 [ 128.372562][ T9036] should_fail.cold+0xa/0x15 [ 128.377181][ T9036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 128.383019][ T9036] should_fail_alloc_page+0x50/0x60 [ 128.388228][ T9036] __alloc_pages_nodemask+0x1a1/0x8d0 [ 128.393629][ T9036] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 128.399362][ T9036] ? find_held_lock+0x35/0x130 [ 128.404145][ T9036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 128.409965][ T9036] cache_grow_begin+0x9c/0x860 [ 128.414739][ T9036] ? getname_flags+0xd6/0x5b0 [ 128.414756][ T9036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 128.414774][ T9036] kmem_cache_alloc+0x62d/0x6f0 [ 128.414786][ T9036] ? fput+0x1b/0x20 [ 128.414800][ T9036] ? ksys_write+0x1cf/0x290 [ 128.414818][ T9036] getname_flags+0xd6/0x5b0 [ 128.414833][ T9036] ? entry_SYSENTER_compat+0x70/0x7f [ 128.414851][ T9036] getname+0x1a/0x20 [ 128.425735][ T9036] __ia32_compat_sys_execve+0x72/0xc0 [ 128.425753][ T9036] do_fast_syscall_32+0x281/0xd54 [ 128.425777][ T9036] entry_SYSENTER_compat+0x70/0x7f [ 128.467971][ T9036] RIP: 0023:0xf7f98849 [ 128.472051][ T9036] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 128.491671][ T9036] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 128.500106][ T9036] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 128.508097][ T9036] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 128.516095][ T9036] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 128.524073][ T9036] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 08:51:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xccee, 0x200000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22000008}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r1, 0x18, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100000000}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x81}, 0x4040) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x3da, 0xa) 08:51:55 executing program 3: socketpair(0x10, 0x6, 0x8, &(0x7f00000000c0)={0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x1, 0x2, 0x4, 0xfffffffffffffffe, "ffe0416cb434f94d7261e202ae3386537934feb9eecade0e027743e784f55d3265d29355d6d478adaed8a924ab4532d3c8e1dda86dd7a60d99a6b0ba502d89eb3b93a01a032c8c5f61b3f6bdaf077e757c48e57554673490e97325a5c02f68aac079475b9396e160a717f03435fb5d9eb78ba1bc64795465bc1d5a940abf88597681f5365e047762947f591206ade28b56898b77d1154651bfe91bfed39c325e82207ae0412d9e65b478020171dc693e30e88435336300d4f3"}, 0xc9) syz_execute_func(&(0x7f0000000000)="61149299cd801b86ecf56962c4c27958c5696200d9c4a5769a0f1805fdffffc4c2cd97d510c44139eff91cc167a10101fec4660f38dcbe9ef70000050a2a8686dfe4da7676f2fb1e8f2000660f383aa20100000021513666f3e1dc8fe950939b9b000000c1ea01a82a2a65dc5f00f0f79d00008020363ef84c03aee42c24a1a1460f569fc4c135f95600009508419508410153fe6736426760664747c3c3efb3000000007250314f869149450fb4b4722d9b1411c4e245be46000c") sysfs$2(0x2, 0x80000001, &(0x7f00000000c0)) 08:51:55 executing program 4: socketpair(0x0, 0x8080f, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x8, 0x4) r2 = dup3(r0, r1, 0x80000) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000100)=0x5) r3 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_SELECTION(r3, 0x2, &(0x7f00000000c0)) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) keyctl$read(0xb, r4, &(0x7f00000001c0)=""/52, 0x1e5) [ 128.532061][ T9036] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:51:55 executing program 2 (fault-call:4 fault-nth:3): personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:55 executing program 5 (fault-call:2 fault-nth:2): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:51:55 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x80200, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000240)={r1, 0x2}) r2 = socket$inet(0x2, 0x802, 0x200000) r3 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x40000) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x40000, 0x0) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x3, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000001c0)) ioctl$sock_netdev_private(r3, 0x89f2, &(0x7f00000002c0)="9b41fbe277a9772ece063f30003efe1ee7471c4a3998813bec3d77ef876c5eeb1ab72d8f05616be56a0cfa47a689cd1ec3ae4a8f0f3447941ed2a14af08697b6ac7267f2fce19f0f688453cdf32facca4211db888140a57b4f4849252d37d7bc674e3fbe6acde3bb7b2b5bda63595b371ee2790f5f33c416e88ccb078cda9cf9f8e1459955554eeb771778f14c7d7e7cd5647126501511a0d7ee7689654d1b19089014ce69b9da58b285d1db35970d9bda36e29fc912a45cdf953038f0e799b3d274545ea5d32c4fb49643e6155b") openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_VERSION(r5, 0xc0246400, &(0x7f0000000680)={0x3, 0x3, 0x81, 0x0, &(0x7f00000004c0), 0xa4, &(0x7f0000000500)=""/164, 0x90, &(0x7f00000005c0)=""/144}) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) dup3(r2, r2, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000440)={0xfff, 0x0, 0x3}) connect(r3, &(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x2, 0x4, 0x0, 0x0, {0xa, 0x4e22, 0x100000000, @loopback, 0x2}}}, 0x80) [ 128.587176][ T9036] Invalid argument reading file caps for ./file0 08:51:55 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f00000000c0)=""/184) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x10000000000000b6, 0x2, [{0x20f}]}) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000180)) [ 128.680632][ T9057] FAULT_INJECTION: forcing a failure. [ 128.680632][ T9057] name failslab, interval 1, probability 0, space 0, times 0 [ 128.683457][ T9058] FAULT_INJECTION: forcing a failure. [ 128.683457][ T9058] name failslab, interval 1, probability 0, space 0, times 0 [ 128.719917][ T9057] CPU: 0 PID: 9057 Comm: syz-executor.2 Not tainted 5.1.0+ #5 [ 128.727417][ T9057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.737486][ T9057] Call Trace: [ 128.740791][ T9057] dump_stack+0x172/0x1f0 [ 128.745136][ T9057] should_fail.cold+0xa/0x15 [ 128.749732][ T9057] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 128.755553][ T9057] __should_failslab+0x121/0x190 [ 128.760499][ T9057] should_failslab+0x9/0x14 [ 128.765009][ T9057] kmem_cache_alloc+0x47/0x6f0 [ 128.769772][ T9057] ? vm_area_dup+0x21/0x170 [ 128.774538][ T9057] ? rcu_read_lock_sched_held+0x110/0x130 [ 128.780261][ T9057] anon_vma_clone+0xde/0x480 [ 128.784861][ T9057] __split_vma+0x180/0x570 [ 128.789273][ T9057] ? find_vma+0x30/0x170 [ 128.793519][ T9057] __do_munmap+0x368/0xef0 [ 128.797943][ T9057] ? arch_get_unmapped_area+0x620/0x620 [ 128.803493][ T9057] mmap_region+0x227/0x1770 [ 128.808019][ T9057] ? _kstrtoul+0x170/0x170 [ 128.812438][ T9057] ? __x64_sys_brk+0x760/0x760 [ 128.817207][ T9057] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 128.823444][ T9057] ? get_unmapped_area+0x295/0x3b0 [ 128.828563][ T9057] do_mmap+0x8e2/0x1080 [ 128.832720][ T9057] vm_mmap_pgoff+0x1c5/0x230 [ 128.837316][ T9057] ? vma_is_stack_for_current+0xd0/0xd0 [ 128.842858][ T9057] ? ksys_dup3+0x3e0/0x3e0 [ 128.847284][ T9057] ksys_mmap_pgoff+0x4aa/0x630 [ 128.852220][ T9057] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 128.857851][ T9057] ? __ia32_sys_read+0xb0/0xb0 [ 128.862611][ T9057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 128.868073][ T9057] ? do_fast_syscall_32+0xd1/0xd54 [ 128.873184][ T9057] ? entry_SYSENTER_compat+0x70/0x7f [ 128.878478][ T9057] __ia32_sys_mmap_pgoff+0xdd/0x1a0 [ 128.883681][ T9057] do_fast_syscall_32+0x281/0xd54 [ 128.888710][ T9057] entry_SYSENTER_compat+0x70/0x7f [ 128.893812][ T9057] RIP: 0023:0xf7f1e849 [ 128.897877][ T9057] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 128.917482][ T9057] RSP: 002b:00000000f5d1a0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000c0 [ 128.925885][ T9057] RAX: ffffffffffffffda RBX: 0000000020ffb000 RCX: 0000000000001000 [ 128.933847][ T9057] RDX: 0000000000000009 RSI: 0000000000000011 RDI: 0000000000000004 [ 128.941811][ T9057] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 128.949778][ T9057] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 128.957743][ T9057] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 128.965752][ T9058] CPU: 1 PID: 9058 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 128.973224][ T9058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.983284][ T9058] Call Trace: [ 128.986588][ T9058] dump_stack+0x172/0x1f0 [ 128.990928][ T9058] should_fail.cold+0xa/0x15 [ 128.995538][ T9058] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 129.001359][ T9058] ? ___might_sleep+0x163/0x280 [ 129.006217][ T9058] __should_failslab+0x121/0x190 [ 129.011159][ T9058] should_failslab+0x9/0x14 [ 129.015665][ T9058] kmem_cache_alloc+0x2b2/0x6f0 [ 129.020504][ T9058] ? save_stack+0x5c/0x90 [ 129.024818][ T9058] ? save_stack+0x23/0x90 [ 129.029134][ T9058] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 129.034923][ T9058] ? kasan_slab_alloc+0xf/0x20 [ 129.039677][ T9058] dup_fd+0x85/0xb30 [ 129.043561][ T9058] ? mark_held_locks+0xf0/0xf0 [ 129.048314][ T9058] unshare_fd+0x160/0x1d0 [ 129.052626][ T9058] ? cache_grow_end+0xa4/0x190 [ 129.057462][ T9058] ? pidfd_release+0x50/0x50 [ 129.062038][ T9058] ? cache_grow_end+0xa4/0x190 [ 129.066801][ T9058] unshare_files+0x7f/0x1f0 [ 129.071284][ T9058] ? lock_downgrade+0x880/0x880 [ 129.076123][ T9058] ? __ia32_sys_unshare+0x40/0x40 [ 129.081133][ T9058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.087372][ T9058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.093601][ T9058] __do_execve_file.isra.0+0x27e/0x23a0 [ 129.099148][ T9058] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 129.104854][ T9058] ? __check_object_size+0x3d/0x42f [ 129.110052][ T9058] ? copy_strings_kernel+0x110/0x110 [ 129.115320][ T9058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 129.121559][ T9058] ? getname_flags+0x277/0x5b0 [ 129.126310][ T9058] ? entry_SYSENTER_compat+0x70/0x7f [ 129.131578][ T9058] __ia32_compat_sys_execve+0x94/0xc0 [ 129.136941][ T9058] do_fast_syscall_32+0x281/0xd54 [ 129.141957][ T9058] entry_SYSENTER_compat+0x70/0x7f [ 129.147055][ T9058] RIP: 0023:0xf7f98849 [ 129.151109][ T9058] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 129.170780][ T9058] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b 08:51:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='setgroups\x00') read(r0, &(0x7f0000000000)=""/169, 0x45c) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) write$P9_RMKDIR(r0, 0x0, 0xfffffffffffffd56) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000100)={0x0, 0x0, 0x102, 0x5, {0x8, 0x1, 0x8, 0x8}}) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000700000004000000600400000000000000000000140100007c4800007c0300007c03000004000000", @ANYRES64=r0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001401000000000000000000000000000000000000000000000000000024004155444954000000000000000000000000000000000000000000000000000000000000000003ac1e0001000000ffff00000023f9fab9cb4700000000000000000000000000000000000000ffffffffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ff0000000000000000000000000000000800ff050000050000766574683000000000000000000000006272696467655f736c6176655f30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000140000000000000000000000f00034010000000000000000000000000000000000000000000000000000440049444c4554494d45520000000000000000000000000000000000000000000500000073797a30000000000000000000000000000000000000000000000000ffff0000ffffffffe0000001ffffffffffffff0016148e196dae000000000000000000000000000000000000ff0000ffffff00000000000000000000000000000000000000000000000000000000000000000000ff00ff00ffff00000000000000000000000200000009ffe000070000627269646765300000000000000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000f00034010000000000000000000000000000000000000000000000000000440049444c4554494d45520000000000000000000000000000000000000000000200000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e4000000000000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x3) 08:51:55 executing program 2 (fault-call:4 fault-nth:4): personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 129.179173][ T9058] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 129.187128][ T9058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 129.195081][ T9058] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 129.203042][ T9058] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 129.210994][ T9058] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 129.272305][ T9070] FAULT_INJECTION: forcing a failure. [ 129.272305][ T9070] name failslab, interval 1, probability 0, space 0, times 0 [ 129.297778][ T9070] CPU: 0 PID: 9070 Comm: syz-executor.2 Not tainted 5.1.0+ #5 [ 129.305283][ T9070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.315349][ T9070] Call Trace: [ 129.318672][ T9070] dump_stack+0x172/0x1f0 [ 129.323037][ T9070] should_fail.cold+0xa/0x15 [ 129.327650][ T9070] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 129.333488][ T9070] ? ___might_sleep+0x163/0x280 [ 129.338364][ T9070] __should_failslab+0x121/0x190 [ 129.343316][ T9070] should_failslab+0x9/0x14 [ 129.347820][ T9070] kmem_cache_alloc+0x2b2/0x6f0 [ 129.352654][ T9070] ? __do_munmap+0x8a0/0xef0 [ 129.357230][ T9070] vm_area_alloc+0x20/0x110 [ 129.361749][ T9070] mmap_region+0x964/0x1770 [ 129.366274][ T9070] ? _kstrtoul+0x170/0x170 [ 129.370688][ T9070] ? __x64_sys_brk+0x760/0x760 [ 129.375523][ T9070] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 129.381752][ T9070] ? get_unmapped_area+0x295/0x3b0 [ 129.386847][ T9070] do_mmap+0x8e2/0x1080 [ 129.391003][ T9070] vm_mmap_pgoff+0x1c5/0x230 [ 129.395593][ T9070] ? vma_is_stack_for_current+0xd0/0xd0 [ 129.401138][ T9070] ? ksys_dup3+0x3e0/0x3e0 [ 129.405555][ T9070] ksys_mmap_pgoff+0x4aa/0x630 [ 129.410303][ T9070] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 129.415930][ T9070] ? __ia32_sys_read+0xb0/0xb0 [ 129.420687][ T9070] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 129.426125][ T9070] ? do_fast_syscall_32+0xd1/0xd54 [ 129.431228][ T9070] ? entry_SYSENTER_compat+0x70/0x7f [ 129.436518][ T9070] __ia32_sys_mmap_pgoff+0xdd/0x1a0 [ 129.441703][ T9070] do_fast_syscall_32+0x281/0xd54 [ 129.446730][ T9070] entry_SYSENTER_compat+0x70/0x7f [ 129.451833][ T9070] RIP: 0023:0xf7f1e849 [ 129.455882][ T9070] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 129.475468][ T9070] RSP: 002b:00000000f5d1a0cc EFLAGS: 00000296 ORIG_RAX: 00000000000000c0 [ 129.483861][ T9070] RAX: ffffffffffffffda RBX: 0000000020ffb000 RCX: 0000000000001000 [ 129.491818][ T9070] RDX: 0000000000000009 RSI: 0000000000000011 RDI: 0000000000000004 [ 129.499770][ T9070] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 129.507721][ T9070] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 129.516730][ T9070] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:51:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x5a1600, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000040)) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tgkill(0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)) 08:51:57 executing program 5 (fault-call:2 fault-nth:3): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:51:57 executing program 2 (fault-call:4 fault-nth:5): personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:57 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fgetxattr(r0, &(0x7f0000000240)=@known='system.advise\x00', &(0x7f0000000280)=""/177, 0xb1) r1 = open(0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) ustat(0x0, 0x0) getpeername(r0, &(0x7f0000000100)=@ipx, &(0x7f0000000200)=0x80) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) sendmmsg(r4, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000000c0)={0x4a, 0x8, 0x81}, 0xc) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:51:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000000)=@sco, 0x80, &(0x7f00000001c0), 0x4, &(0x7f0000000400)=""/29, 0x1d}, 0x20) bind$alg(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_capability(r1, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000480)=@v2={0x2000000, [{0x3}, {0x3}]}, 0x14, 0x3) accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 08:51:57 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'erspan0\x00'}}, 0x1e) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) [ 131.047686][ T9089] FAULT_INJECTION: forcing a failure. [ 131.047686][ T9089] name failslab, interval 1, probability 0, space 0, times 0 [ 131.081610][ T9089] CPU: 1 PID: 9089 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 131.089122][ T9089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.099188][ T9089] Call Trace: [ 131.102495][ T9089] dump_stack+0x172/0x1f0 [ 131.106844][ T9089] should_fail.cold+0xa/0x15 [ 131.111460][ T9089] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 131.117281][ T9089] ? ___might_sleep+0x163/0x280 [ 131.122150][ T9089] __should_failslab+0x121/0x190 [ 131.127106][ T9089] should_failslab+0x9/0x14 [ 131.131622][ T9089] kmem_cache_alloc_trace+0x2d1/0x760 [ 131.137011][ T9089] ? lock_downgrade+0x880/0x880 [ 131.141891][ T9089] alloc_fdtable+0x86/0x290 [ 131.146400][ T9089] dup_fd+0x743/0xb30 [ 131.150398][ T9089] unshare_fd+0x160/0x1d0 [ 131.154729][ T9089] ? cache_grow_end+0xa4/0x190 [ 131.159505][ T9089] ? pidfd_release+0x50/0x50 [ 131.164104][ T9089] ? cache_grow_end+0xa4/0x190 [ 131.168895][ T9089] unshare_files+0x7f/0x1f0 [ 131.173400][ T9089] ? lock_downgrade+0x880/0x880 [ 131.178256][ T9089] ? __ia32_sys_unshare+0x40/0x40 [ 131.183291][ T9089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.189538][ T9089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:51:57 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'erspan0\x00'}}, 0x1e) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}) [ 131.195796][ T9089] __do_execve_file.isra.0+0x27e/0x23a0 [ 131.201346][ T9089] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 131.207152][ T9089] ? __check_object_size+0x3d/0x42f [ 131.207178][ T9089] ? copy_strings_kernel+0x110/0x110 [ 131.207196][ T9089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.207209][ T9089] ? getname_flags+0x277/0x5b0 [ 131.207225][ T9089] ? entry_SYSENTER_compat+0x70/0x7f [ 131.207240][ T9089] __ia32_compat_sys_execve+0x94/0xc0 [ 131.207261][ T9089] do_fast_syscall_32+0x281/0xd54 [ 131.217743][ T9089] entry_SYSENTER_compat+0x70/0x7f [ 131.217755][ T9089] RIP: 0023:0xf7f98849 [ 131.217774][ T9089] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 131.217786][ T9089] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 131.281447][ T9089] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 131.289414][ T9089] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 08:51:58 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:51:58 executing program 0: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000000000000000aab40003003e00e50d0000349c1fd83d00000000000000000000000000000000000000000000000020380003000000"], 0x3c) sendfile(r0, r0, &(0x7f0000000080), 0xfba) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 131.297366][ T9089] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 131.305333][ T9089] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 131.313284][ T9089] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:51:58 executing program 4: capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) shmget(0x1, 0x4000, 0x78000314, &(0x7f0000ffb000/0x4000)=nil) 08:51:58 executing program 5 (fault-call:2 fault-nth:4): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:51:58 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x2, 0x9, 0x11, r0, 0x0) 08:51:58 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc00c64b5, &(0x7f0000000140)={&(0x7f0000000040)=[0x0], 0x1}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x2000000002) syz_open_dev$radio(0x0, 0x0, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, 0x0, &(0x7f0000000300)) r3 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(r3) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000240)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r4, r4) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000100)={0x0, 0xfffffffffffffc4e, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f40aa76a85150dab1fd81d3423f454975709e4095abf7dd4390e4aef82f9d7867500a184f602d7052a56bd4b0e4ebb7fc70d00007a7f5164c8859d00005cdc843a9fe672d717fb0000000000"], 0x1}}, 0x44801) sendto$inet(r4, &(0x7f0000000400)="1c554cf8b93687aab173d8032491f239015b84dcb4678ad1d63110fe50222ecdab43be4f8e44ebb3fd0953c47b4b239192db69ddbdf96044e77bcca1da6e934db89b", 0x42, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) socket$inet(0xa, 0x801, 0x0) [ 131.476161][ T9113] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) [ 131.498125][ T9115] FAULT_INJECTION: forcing a failure. [ 131.498125][ T9115] name failslab, interval 1, probability 0, space 0, times 0 [ 131.546198][ T9115] CPU: 0 PID: 9115 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 131.553720][ T9115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.563798][ T9115] Call Trace: [ 131.567113][ T9115] dump_stack+0x172/0x1f0 [ 131.571442][ T9115] should_fail.cold+0xa/0x15 [ 131.576056][ T9115] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 131.581901][ T9115] ? ___might_sleep+0x163/0x280 [ 131.586781][ T9115] __should_failslab+0x121/0x190 [ 131.591737][ T9115] should_failslab+0x9/0x14 [ 131.596266][ T9115] kmem_cache_alloc_node_trace+0x270/0x720 [ 131.602088][ T9115] __kmalloc_node+0x3d/0x70 [ 131.606586][ T9115] kvmalloc_node+0x68/0x100 [ 131.611081][ T9115] alloc_fdtable+0xd6/0x290 [ 131.615572][ T9115] dup_fd+0x743/0xb30 [ 131.619637][ T9115] unshare_fd+0x160/0x1d0 [ 131.623952][ T9115] ? cache_grow_end+0xa4/0x190 [ 131.628699][ T9115] ? pidfd_release+0x50/0x50 [ 131.633273][ T9115] ? cache_grow_end+0xa4/0x190 [ 131.638025][ T9115] unshare_files+0x7f/0x1f0 [ 131.642511][ T9115] ? lock_downgrade+0x880/0x880 [ 131.647344][ T9115] ? __ia32_sys_unshare+0x40/0x40 [ 131.652353][ T9115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.658574][ T9115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.664813][ T9115] __do_execve_file.isra.0+0x27e/0x23a0 [ 131.670349][ T9115] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 131.676052][ T9115] ? __check_object_size+0x3d/0x42f [ 131.681239][ T9115] ? copy_strings_kernel+0x110/0x110 [ 131.686506][ T9115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 131.692748][ T9115] ? getname_flags+0x277/0x5b0 [ 131.697494][ T9115] ? entry_SYSENTER_compat+0x70/0x7f [ 131.702761][ T9115] __ia32_compat_sys_execve+0x94/0xc0 [ 131.708117][ T9115] do_fast_syscall_32+0x281/0xd54 [ 131.713123][ T9115] entry_SYSENTER_compat+0x70/0x7f [ 131.718213][ T9115] RIP: 0023:0xf7f98849 [ 131.722355][ T9115] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 08:51:58 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1002, 0x9, 0x11, r0, 0x0) 08:51:58 executing program 4: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f00000001c0)="12", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) connect$unix(r2, &(0x7f0000000240)=@abs, 0x6e) [ 131.741967][ T9115] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 131.750361][ T9115] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 131.758328][ T9115] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 131.766283][ T9115] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 131.774240][ T9115] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 131.782195][ T9115] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:51:58 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000140)={{0xffffffffffffffff, 0x2, 0x7fffffff, 0x0, 0xc4}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) ustat(0x0, 0x0) r6 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r6, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r6, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 08:51:58 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x100a, 0x9, 0x11, r0, 0x0) 08:51:58 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) syz_emit_ethernet(0x6e, &(0x7f0000000080)={@random="972532b0f222", @random="188d3ea1dabc", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x6, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) ioctl$PPPIOCSMRU(r0, 0x80047453, 0x0) 08:51:58 executing program 5 (fault-call:2 fault-nth:5): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 132.021581][ T9150] FAULT_INJECTION: forcing a failure. [ 132.021581][ T9150] name failslab, interval 1, probability 0, space 0, times 0 08:51:58 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1fffff, 0x9, 0x11, r0, 0x0) [ 132.160386][ T9150] CPU: 1 PID: 9150 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 132.167899][ T9150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.177965][ T9150] Call Trace: [ 132.181274][ T9150] dump_stack+0x172/0x1f0 [ 132.185632][ T9150] should_fail.cold+0xa/0x15 [ 132.190237][ T9150] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 132.196060][ T9150] ? ___might_sleep+0x163/0x280 [ 132.200936][ T9150] __should_failslab+0x121/0x190 [ 132.205889][ T9150] should_failslab+0x9/0x14 [ 132.210404][ T9150] kmem_cache_alloc_node_trace+0x270/0x720 [ 132.216215][ T9150] ? kasan_unpoison_shadow+0x35/0x50 [ 132.221511][ T9150] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 132.227504][ T9150] __kmalloc_node+0x3d/0x70 [ 132.232015][ T9150] kvmalloc_node+0x68/0x100 [ 132.236525][ T9150] alloc_fdtable+0x142/0x290 [ 132.241121][ T9150] dup_fd+0x743/0xb30 [ 132.245121][ T9150] unshare_fd+0x160/0x1d0 [ 132.249455][ T9150] ? cache_grow_end+0xa4/0x190 [ 132.254224][ T9150] ? pidfd_release+0x50/0x50 [ 132.258829][ T9150] ? cache_grow_end+0xa4/0x190 [ 132.263603][ T9150] unshare_files+0x7f/0x1f0 [ 132.268111][ T9150] ? lock_downgrade+0x880/0x880 [ 132.272977][ T9150] ? __ia32_sys_unshare+0x40/0x40 [ 132.278008][ T9150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.284254][ T9150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.290503][ T9150] __do_execve_file.isra.0+0x27e/0x23a0 [ 132.296051][ T9150] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 132.301773][ T9150] ? __check_object_size+0x3d/0x42f [ 132.306995][ T9150] ? copy_strings_kernel+0x110/0x110 [ 132.312290][ T9150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.318538][ T9150] ? getname_flags+0x277/0x5b0 [ 132.323308][ T9150] ? entry_SYSENTER_compat+0x70/0x7f [ 132.328601][ T9150] __ia32_compat_sys_execve+0x94/0xc0 [ 132.333984][ T9150] do_fast_syscall_32+0x281/0xd54 [ 132.339021][ T9150] entry_SYSENTER_compat+0x70/0x7f [ 132.344829][ T9150] RIP: 0023:0xf7f98849 [ 132.348904][ T9150] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 132.368514][ T9150] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 132.376935][ T9150] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 132.384917][ T9150] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 132.393000][ T9150] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 132.400977][ T9150] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 132.413872][ T9150] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 132.440394][ T9147] syz-executor.3 (9147) used greatest stack depth: 22448 bytes left 08:51:59 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x20ffb000, 0x9, 0x11, r0, 0x0) 08:51:59 executing program 5 (fault-call:2 fault-nth:6): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:51:59 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) clone(0x8020002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:51:59 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xdf003000, 0x9, 0x11, r0, 0x0) 08:51:59 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000040807031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0xa000) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000100)=0x4000) 08:51:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000000)={'eql\x00\x00\xdf\xdd\x94D\x8f\x15\xcf!\x00'}) socket$key(0xf, 0x3, 0x2) 08:51:59 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000140)={{0xffffffffffffffff, 0x2, 0x7fffffff, 0x0, 0xc4}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) ustat(0x0, 0x0) r6 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r6, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r6, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 08:51:59 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) [ 132.820173][ T9179] FAULT_INJECTION: forcing a failure. [ 132.820173][ T9179] name failslab, interval 1, probability 0, space 0, times 0 [ 132.845776][ T9182] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 132.887367][ T9179] CPU: 1 PID: 9179 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 132.894873][ T9179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.904942][ T9179] Call Trace: [ 132.908256][ T9179] dump_stack+0x172/0x1f0 [ 132.912614][ T9179] should_fail.cold+0xa/0x15 [ 132.917234][ T9179] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 132.923069][ T9179] ? ___might_sleep+0x163/0x280 [ 132.927949][ T9179] __should_failslab+0x121/0x190 [ 132.932911][ T9179] should_failslab+0x9/0x14 [ 132.937444][ T9179] kmem_cache_alloc_trace+0x2d1/0x760 [ 132.942850][ T9179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.949110][ T9179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.955375][ T9179] __do_execve_file.isra.0+0x325/0x23a0 [ 132.960946][ T9179] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 132.966683][ T9179] ? __check_object_size+0x3d/0x42f [ 132.971921][ T9179] ? copy_strings_kernel+0x110/0x110 [ 132.977227][ T9179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 132.983488][ T9179] ? getname_flags+0x277/0x5b0 [ 132.988272][ T9179] ? entry_SYSENTER_compat+0x70/0x7f [ 132.993590][ T9179] __ia32_compat_sys_execve+0x94/0xc0 [ 132.998991][ T9179] do_fast_syscall_32+0x281/0xd54 [ 133.004041][ T9179] entry_SYSENTER_compat+0x70/0x7f [ 133.009162][ T9179] RIP: 0023:0xf7f98849 [ 133.013242][ T9179] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 08:51:59 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) clone(0x8020002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 133.032858][ T9179] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 133.041280][ T9179] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 133.049265][ T9179] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 133.057251][ T9179] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 133.065236][ T9179] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 133.073223][ T9179] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 133.091617][ T9182] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 08:51:59 executing program 5 (fault-call:2 fault-nth:7): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) clone(0x8020002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:00 executing program 4: r0 = socket$inet6(0xa, 0x80005, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7fffffff) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/135, 0x87}, {&(0x7f00000000c0)=""/205, 0xcd}], 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) 08:52:00 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x2) 08:52:00 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x10080001, 0x31, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) futex(&(0x7f0000000000), 0x80, 0x0, 0x0, 0x0, 0x0) [ 133.331235][ T9223] FAULT_INJECTION: forcing a failure. [ 133.331235][ T9223] name failslab, interval 1, probability 0, space 0, times 0 08:52:00 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0xa) [ 133.424280][ T9223] CPU: 0 PID: 9223 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 133.431790][ T9223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.441859][ T9223] Call Trace: [ 133.445159][ T9223] dump_stack+0x172/0x1f0 [ 133.449497][ T9223] should_fail.cold+0xa/0x15 [ 133.454114][ T9223] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 133.459946][ T9223] ? ___might_sleep+0x163/0x280 [ 133.464819][ T9223] __should_failslab+0x121/0x190 [ 133.469768][ T9223] should_failslab+0x9/0x14 [ 133.474279][ T9223] kmem_cache_alloc+0x2b2/0x6f0 [ 133.479143][ T9223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.485398][ T9223] ? __validate_process_creds+0x22d/0x380 [ 133.491159][ T9223] prepare_creds+0x3e/0x3f0 [ 133.495691][ T9223] prepare_exec_creds+0x12/0xf0 [ 133.500564][ T9223] __do_execve_file.isra.0+0x393/0x23a0 [ 133.506124][ T9223] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 133.512816][ T9223] ? __check_object_size+0x3d/0x42f [ 133.518034][ T9223] ? copy_strings_kernel+0x110/0x110 [ 133.523326][ T9223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 133.529578][ T9223] ? getname_flags+0x277/0x5b0 [ 133.534357][ T9223] ? entry_SYSENTER_compat+0x70/0x7f [ 133.539657][ T9223] __ia32_compat_sys_execve+0x94/0xc0 [ 133.545058][ T9223] do_fast_syscall_32+0x281/0xd54 [ 133.550115][ T9223] entry_SYSENTER_compat+0x70/0x7f [ 133.555236][ T9223] RIP: 0023:0xf7f98849 08:52:00 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0xa00) 08:52:00 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x3f00) [ 133.559322][ T9223] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 133.578938][ T9223] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 133.587364][ T9223] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 133.595352][ T9223] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 133.603336][ T9223] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 133.611568][ T9223] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 08:52:00 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) [ 133.619547][ T9223] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 133.733010][ T9191] syz-executor.3 (9191) used greatest stack depth: 22432 bytes left 08:52:00 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000140)={{0xffffffffffffffff, 0x2, 0x7fffffff, 0x0, 0xc4}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) ustat(0x0, 0x0) r6 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r6, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r6, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 08:52:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) clone(0x8020002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:00 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:00 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x4000) 08:52:00 executing program 5 (fault-call:2 fault-nth:8): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:00 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) [ 133.904937][ T9264] FAULT_INJECTION: forcing a failure. [ 133.904937][ T9264] name failslab, interval 1, probability 0, space 0, times 0 [ 134.004316][ T9264] CPU: 1 PID: 9264 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 134.011826][ T9264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.021892][ T9264] Call Trace: [ 134.025196][ T9264] dump_stack+0x172/0x1f0 [ 134.029554][ T9264] should_fail.cold+0xa/0x15 [ 134.034168][ T9264] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 134.039988][ T9264] ? ___might_sleep+0x163/0x280 [ 134.044856][ T9264] __should_failslab+0x121/0x190 [ 134.049810][ T9264] should_failslab+0x9/0x14 [ 134.054322][ T9264] __kmalloc+0x2dc/0x740 [ 134.058576][ T9264] ? refcount_inc_not_zero_checked+0x144/0x200 [ 134.064743][ T9264] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 134.070569][ T9264] ? security_prepare_creds+0x123/0x190 [ 134.076130][ T9264] security_prepare_creds+0x123/0x190 [ 134.081517][ T9264] prepare_creds+0x2f5/0x3f0 [ 134.086125][ T9264] prepare_exec_creds+0x12/0xf0 [ 134.090996][ T9264] __do_execve_file.isra.0+0x393/0x23a0 [ 134.096559][ T9264] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 134.102291][ T9264] ? __check_object_size+0x3d/0x42f [ 134.107504][ T9264] ? copy_strings_kernel+0x110/0x110 [ 134.112804][ T9264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.119064][ T9264] ? getname_flags+0x277/0x5b0 [ 134.123842][ T9264] ? entry_SYSENTER_compat+0x70/0x7f [ 134.129139][ T9264] __ia32_compat_sys_execve+0x94/0xc0 [ 134.134535][ T9264] do_fast_syscall_32+0x281/0xd54 [ 134.139580][ T9264] entry_SYSENTER_compat+0x70/0x7f [ 134.144693][ T9264] RIP: 0023:0xf7f98849 [ 134.148765][ T9264] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 134.168367][ T9264] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 134.168381][ T9264] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 134.168389][ T9264] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 134.168395][ T9264] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 08:52:01 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, 0xffffffffffffffff, 0x0) 08:52:01 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x6, 0x400000) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000100)) ioctl$TUNGETFILTER(r0, 0x400454da, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x14000, 0x0) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000080)={r3, 0x1, 0xfffffffffffff000, 0x3000}) ioctl$EVIOCSFF(r3, 0x402c4580, &(0x7f0000000240)={0x0, 0x6, 0x7, {0xa9, 0x7}, {0x1, 0x1ff}, @cond=[{0x2a, 0x10000000, 0x6, 0x3, 0x5, 0x4}, {0x400, 0x7fff, 0x80000000, 0x9, 0x1, 0xfffffffffffffffe}]}) 08:52:01 executing program 5 (fault-call:2 fault-nth:9): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:01 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x800000) [ 134.168410][ T9264] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 134.184772][ T9264] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 134.319564][ T9307] FAULT_INJECTION: forcing a failure. [ 134.319564][ T9307] name failslab, interval 1, probability 0, space 0, times 0 [ 134.374265][ T9307] CPU: 0 PID: 9307 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 134.381772][ T9307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.391860][ T9307] Call Trace: [ 134.395163][ T9307] dump_stack+0x172/0x1f0 [ 134.399510][ T9307] should_fail.cold+0xa/0x15 [ 134.404119][ T9307] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 134.409939][ T9307] ? ___might_sleep+0x163/0x280 [ 134.414807][ T9307] __should_failslab+0x121/0x190 [ 134.419754][ T9307] should_failslab+0x9/0x14 [ 134.424268][ T9307] kmem_cache_alloc+0x2b2/0x6f0 [ 134.429126][ T9307] ? __kernel_text_address+0xd/0x40 [ 134.434332][ T9307] ? unwind_get_return_address+0x61/0xa0 [ 134.439963][ T9307] ? profile_setup.cold+0xbb/0xbb [ 134.445027][ T9307] __alloc_file+0x27/0x300 [ 134.449454][ T9307] alloc_empty_file+0x72/0x170 [ 134.454224][ T9307] path_openat+0xef/0x46e0 [ 134.458644][ T9307] ? stack_trace_save+0xac/0xe0 [ 134.463501][ T9307] ? stack_trace_consume_entry+0x190/0x190 [ 134.469311][ T9307] ? stack_trace_save+0xac/0xe0 [ 134.474173][ T9307] ? save_stack+0x5c/0x90 [ 134.478509][ T9307] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 134.483892][ T9307] ? __kmalloc+0x15c/0x740 [ 134.488308][ T9307] ? security_prepare_creds+0x123/0x190 [ 134.493859][ T9307] ? prepare_creds+0x2f5/0x3f0 [ 134.498642][ T9307] ? prepare_exec_creds+0x12/0xf0 [ 134.503684][ T9307] ? __do_execve_file.isra.0+0x393/0x23a0 [ 134.509409][ T9307] ? __ia32_compat_sys_execve+0x94/0xc0 [ 134.514965][ T9307] ? do_fast_syscall_32+0x281/0xd54 [ 134.520199][ T9307] ? entry_SYSENTER_compat+0x70/0x7f [ 134.525578][ T9307] ? save_stack+0x23/0x90 [ 134.529930][ T9307] do_filp_open+0x1a1/0x280 [ 134.534441][ T9307] ? may_open_dev+0x100/0x100 [ 134.539127][ T9307] ? __lock_acquire+0x54f/0x5490 [ 134.544087][ T9307] ? mark_held_locks+0xf0/0xf0 [ 134.548858][ T9307] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 134.554683][ T9307] do_open_execat+0x137/0x690 [ 134.559371][ T9307] ? unregister_binfmt+0x170/0x170 [ 134.564488][ T9307] ? lock_downgrade+0x880/0x880 [ 134.569344][ T9307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.575603][ T9307] ? kasan_check_read+0x11/0x20 [ 134.580462][ T9307] ? do_raw_spin_unlock+0x57/0x270 [ 134.585602][ T9307] __do_execve_file.isra.0+0x178d/0x23a0 [ 134.591247][ T9307] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 134.596984][ T9307] ? copy_strings_kernel+0x110/0x110 [ 134.602280][ T9307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 134.608522][ T9307] ? getname_flags+0x277/0x5b0 [ 134.613282][ T9307] ? entry_SYSENTER_compat+0x70/0x7f [ 134.613300][ T9307] __ia32_compat_sys_execve+0x94/0xc0 [ 134.613323][ T9307] do_fast_syscall_32+0x281/0xd54 [ 134.628965][ T9307] entry_SYSENTER_compat+0x70/0x7f [ 134.634106][ T9307] RIP: 0023:0xf7f98849 [ 134.638178][ T9307] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 134.657796][ T9307] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 134.657809][ T9307] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 134.657816][ T9307] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 134.657822][ T9307] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 134.657829][ T9307] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 134.657835][ T9307] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 134.803493][ T9273] syz-executor.3 (9273) used greatest stack depth: 22080 bytes left 08:52:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0xfffffffffffffffb, 0x2af, 0x0}) 08:52:01 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, 0xffffffffffffffff, 0x0) 08:52:01 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:01 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x800408) 08:52:01 executing program 5 (fault-call:2 fault-nth:10): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) [ 134.984642][ T9332] FAULT_INJECTION: forcing a failure. [ 134.984642][ T9332] name failslab, interval 1, probability 0, space 0, times 0 [ 135.002848][ T9332] CPU: 0 PID: 9332 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 135.010343][ T9332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.020703][ T9332] Call Trace: [ 135.024008][ T9332] dump_stack+0x172/0x1f0 [ 135.028352][ T9332] should_fail.cold+0xa/0x15 [ 135.032961][ T9332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 135.038771][ T9332] ? ___might_sleep+0x163/0x280 [ 135.043614][ T9332] __should_failslab+0x121/0x190 [ 135.048542][ T9332] should_failslab+0x9/0x14 [ 135.048571][ T9332] kmem_cache_alloc+0x2b2/0x6f0 [ 135.048588][ T9332] ? rcu_read_lock_sched_held+0x110/0x130 [ 135.048608][ T9332] ? kmem_cache_alloc+0x32e/0x6f0 [ 135.057928][ T9332] security_file_alloc+0x39/0x170 [ 135.057944][ T9332] __alloc_file+0xac/0x300 [ 135.057966][ T9332] alloc_empty_file+0x72/0x170 [ 135.057984][ T9332] path_openat+0xef/0x46e0 [ 135.057998][ T9332] ? stack_trace_save+0xac/0xe0 [ 135.058012][ T9332] ? stack_trace_consume_entry+0x190/0x190 [ 135.058031][ T9332] ? stack_trace_save+0xac/0xe0 [ 135.068759][ T9332] ? save_stack+0x5c/0x90 [ 135.068776][ T9332] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 135.068791][ T9332] ? __kmalloc+0x15c/0x740 [ 135.068810][ T9332] ? security_prepare_creds+0x123/0x190 [ 135.082977][ T9332] ? prepare_creds+0x2f5/0x3f0 [ 135.082994][ T9332] ? prepare_exec_creds+0x12/0xf0 [ 135.083008][ T9332] ? __do_execve_file.isra.0+0x393/0x23a0 [ 135.083026][ T9332] ? __ia32_compat_sys_execve+0x94/0xc0 [ 135.137960][ T9332] ? do_fast_syscall_32+0x281/0xd54 [ 135.137977][ T9332] ? entry_SYSENTER_compat+0x70/0x7f [ 135.137989][ T9332] ? save_stack+0x23/0x90 [ 135.138012][ T9332] do_filp_open+0x1a1/0x280 [ 135.138033][ T9332] ? may_open_dev+0x100/0x100 [ 135.148751][ T9332] ? __lock_acquire+0x54f/0x5490 [ 135.148777][ T9332] ? mark_held_locks+0xf0/0xf0 [ 135.148793][ T9332] ? refcount_dec_and_mutex_lock+0x90/0x90 08:52:01 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x6) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80040, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2000000000000) ioctl$KVM_GET_FPU(r3, 0x81a0ae8c, &(0x7f0000000d40)) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f0000000080)={[], 0x10000, 0x8, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffd, 0x0, 0x6000, [], 0x100}) 08:52:01 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, 0xffffffffffffffff, 0x0) [ 135.148825][ T9332] do_open_execat+0x137/0x690 [ 135.187714][ T9332] ? unregister_binfmt+0x170/0x170 [ 135.192828][ T9332] ? lock_downgrade+0x880/0x880 [ 135.197667][ T9332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.203903][ T9332] ? kasan_check_read+0x11/0x20 [ 135.208760][ T9332] ? do_raw_spin_unlock+0x57/0x270 [ 135.213882][ T9332] __do_execve_file.isra.0+0x178d/0x23a0 [ 135.219522][ T9332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 135.225269][ T9332] ? copy_strings_kernel+0x110/0x110 08:52:02 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 135.230580][ T9332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.236829][ T9332] ? getname_flags+0x277/0x5b0 [ 135.241604][ T9332] ? entry_SYSENTER_compat+0x70/0x7f [ 135.246905][ T9332] __ia32_compat_sys_execve+0x94/0xc0 [ 135.252297][ T9332] do_fast_syscall_32+0x281/0xd54 [ 135.257336][ T9332] entry_SYSENTER_compat+0x70/0x7f [ 135.262444][ T9332] RIP: 0023:0xf7f98849 [ 135.266516][ T9332] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 08:52:02 executing program 5 (fault-call:2 fault-nth:11): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:02 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x1000000) [ 135.286124][ T9332] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 135.286137][ T9332] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 135.286144][ T9332] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 135.286153][ T9332] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 135.286160][ T9332] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 135.286168][ T9332] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 135.362291][ T9355] FAULT_INJECTION: forcing a failure. [ 135.362291][ T9355] name failslab, interval 1, probability 0, space 0, times 0 [ 135.388490][ T9355] CPU: 1 PID: 9355 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 135.396258][ T9355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.406308][ T9355] Call Trace: [ 135.406331][ T9355] dump_stack+0x172/0x1f0 [ 135.406353][ T9355] should_fail.cold+0xa/0x15 [ 135.406371][ T9355] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 135.406393][ T9355] ? ___might_sleep+0x163/0x280 [ 135.406413][ T9355] __should_failslab+0x121/0x190 [ 135.406433][ T9355] should_failslab+0x9/0x14 [ 135.406452][ T9355] kmem_cache_alloc+0x2b2/0x6f0 [ 135.406469][ T9355] ? nr_iowait+0x130/0x130 [ 135.406485][ T9355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.406504][ T9355] mm_alloc+0x1d/0xd0 [ 135.406538][ T9355] __do_execve_file.isra.0+0xaa3/0x23a0 [ 135.463650][ T9355] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 135.469365][ T9355] ? copy_strings_kernel+0x110/0x110 [ 135.474632][ T9355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 135.480856][ T9355] ? getname_flags+0x277/0x5b0 [ 135.485602][ T9355] ? entry_SYSENTER_compat+0x70/0x7f [ 135.490870][ T9355] __ia32_compat_sys_execve+0x94/0xc0 [ 135.496226][ T9355] do_fast_syscall_32+0x281/0xd54 [ 135.501236][ T9355] entry_SYSENTER_compat+0x70/0x7f [ 135.506328][ T9355] RIP: 0023:0xf7f98849 [ 135.511918][ T9355] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 135.531501][ T9355] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 135.539903][ T9355] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 135.547866][ T9355] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 135.555818][ T9355] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 135.563771][ T9355] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 135.571722][ T9355] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:02 executing program 3: add_key(&(0x7f0000000080)='rxrpc\x00', 0x0, &(0x7f0000000100)="f25cb7133795a3b9c908c8054229dd07b4d7b85d598e502d46d3456aa0a73fb6", 0x20, 0xfffffffffffffffc) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0xa6, 0x0, "d667e747ceabda2eea8bad05a965a98a0a00a15239f353f88b22a4bc3c9f2dbf1e3cec9ad54fc9e5de4f29c90bdf16803fddbdf153f33101a5f50065931ba4e24f31475c79dab9892d662a9fd9c8eb20670c3c12682ccf905389e7b2ac1966d6276c4fb407f3c653bb8468566d22be6351806a7e7b4974184f5557341a6b65b8054bc0b6c6c8f5c2cb216ced6c73023d2c74cbbd05de"}, &(0x7f0000000140), 0x1000) 08:52:02 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:02 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x2000000) 08:52:02 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)) fcntl$lock(r0, 0x6, &(0x7f0000000040)={0x2, 0x0, 0xfd6}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="01000080000000000500000006000000050000000200000002000000000000000500000000000000cf570000000000000700000000000000000000000000000000000000000000000001000000000000000000000000000000000000200000000600000000000000000000000000000000000000000000000000000000000000041600"/144]) 08:52:02 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:02 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x8048000) 08:52:02 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:02 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='#/\x00') 08:52:02 executing program 5 (fault-call:2 fault-nth:12): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:02 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0xa000000) 08:52:02 executing program 4: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7, 0x400) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x3, 0x0, &(0x7f00000002c0)=""/230, &(0x7f0000000180)=""/164, &(0x7f00000003c0)=""/159, 0x5001}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ext3\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000500)='./file0\x00', 0x8800, 0x0) 08:52:02 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='#/\x00') 08:52:02 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:02 executing program 4: personality(0x1bb2baf3005ac137) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) [ 136.041526][ T9401] FAULT_INJECTION: forcing a failure. [ 136.041526][ T9401] name failslab, interval 1, probability 0, space 0, times 0 [ 136.066157][ T9401] CPU: 0 PID: 9401 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 136.073640][ T9401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.083684][ T9401] Call Trace: [ 136.086972][ T9401] dump_stack+0x172/0x1f0 [ 136.091294][ T9401] should_fail.cold+0xa/0x15 [ 136.095895][ T9401] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 136.101690][ T9401] ? ___might_sleep+0x163/0x280 [ 136.106532][ T9401] __should_failslab+0x121/0x190 [ 136.111452][ T9401] should_failslab+0x9/0x14 [ 136.115949][ T9401] kmem_cache_alloc+0x2b2/0x6f0 [ 136.120782][ T9401] ? nr_iowait+0x130/0x130 [ 136.125196][ T9401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.131434][ T9401] mm_alloc+0x1d/0xd0 [ 136.135423][ T9401] __do_execve_file.isra.0+0xaa3/0x23a0 [ 136.141298][ T9401] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 136.147016][ T9401] ? copy_strings_kernel+0x110/0x110 [ 136.152286][ T9401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 136.158508][ T9401] ? getname_flags+0x277/0x5b0 [ 136.163258][ T9401] ? entry_SYSENTER_compat+0x70/0x7f [ 136.168529][ T9401] __ia32_compat_sys_execve+0x94/0xc0 [ 136.173894][ T9401] do_fast_syscall_32+0x281/0xd54 [ 136.178908][ T9401] entry_SYSENTER_compat+0x70/0x7f [ 136.184008][ T9401] RIP: 0023:0xf7f98849 [ 136.188069][ T9401] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 136.207654][ T9401] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 136.216056][ T9401] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 136.224015][ T9401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 136.231970][ T9401] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 08:52:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r1, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffff8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r5) 08:52:03 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x3f000000) 08:52:03 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 136.239924][ T9401] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 136.247882][ T9401] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:03 executing program 4: personality(0x1bb2baf3005ac137) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:03 executing program 5 (fault-call:2 fault-nth:13): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:03 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x40000000) 08:52:03 executing program 4: personality(0x1bb2baf3005ac137) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 136.577131][ T9450] FAULT_INJECTION: forcing a failure. [ 136.577131][ T9450] name failslab, interval 1, probability 0, space 0, times 0 [ 136.599588][ T9450] CPU: 0 PID: 9450 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 136.607087][ T9450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.617151][ T9450] Call Trace: [ 136.620466][ T9450] dump_stack+0x172/0x1f0 [ 136.624822][ T9450] should_fail.cold+0xa/0x15 [ 136.629442][ T9450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 136.635259][ T9450] ? ___might_sleep+0x163/0x280 [ 136.635280][ T9450] __should_failslab+0x121/0x190 [ 136.635296][ T9450] should_failslab+0x9/0x14 [ 136.635311][ T9450] kmem_cache_alloc+0x2b2/0x6f0 [ 136.635336][ T9450] vm_area_alloc+0x20/0x110 [ 136.635354][ T9450] __do_execve_file.isra.0+0xc34/0x23a0 [ 136.635376][ T9450] ? copy_strings_kernel+0x110/0x110 [ 136.635391][ T9450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:52:03 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='#/\x00') 08:52:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) [ 136.635411][ T9450] ? getname_flags+0x277/0x5b0 [ 136.645188][ T9450] ? entry_SYSENTER_compat+0x70/0x7f [ 136.645208][ T9450] __ia32_compat_sys_execve+0x94/0xc0 [ 136.645227][ T9450] do_fast_syscall_32+0x281/0xd54 [ 136.645245][ T9450] entry_SYSENTER_compat+0x70/0x7f [ 136.645257][ T9450] RIP: 0023:0xf7f98849 [ 136.645271][ T9450] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 08:52:03 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 136.645279][ T9450] RSP: 002b:00000000f5d940cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 136.725446][ T9450] RAX: ffffffffffffffda RBX: 0000000020000300 RCX: 0000000000000000 [ 136.725454][ T9450] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 136.725462][ T9450] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 136.725469][ T9450] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 136.725476][ T9450] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r1, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffff8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r5) 08:52:03 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x7fffffffffffe) 08:52:03 executing program 1: r0 = memfd_create(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:03 executing program 5 (fault-call:2 fault-nth:14): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:03 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000080)='#/\x00') 08:52:03 executing program 1: r0 = memfd_create(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 137.184200][ T9473] Invalid argument reading file caps for ./file0 08:52:04 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x80000000000000) 08:52:04 executing program 4: mkdir(0x0, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:04 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:04 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) 08:52:04 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x80040800000000) [ 137.404992][ T9501] Invalid argument reading file caps for ./file0 08:52:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r1, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffff8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r5) 08:52:04 executing program 1: r0 = memfd_create(0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:04 executing program 4: mkdir(0x0, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:04 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) 08:52:04 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40000, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000080)="190f4918f6bf2b808104cfab23002f72d9a056e070c2043a4f474a000000000000000069bbcf1623c3816086147b59c9f11d104f2841cf24064e323ade74e980bb69cb894685d64bf6710fad7389ab3a2fa202c849ab7ef69279ae469e7bc1a52b7227eb94ebde49c8ccea7aa6d0f2eaa286c45729867420b11e959a7ae78747fe532d7609f210d937711e332b5913a22c6529d527659445c2b8e3f40fb1e956b10c51ea5b2a840a7f91b180ca9f40b6d07ba09d088d469086776d89ce0689884b90f663515276cedcd8856ef99341ad017fc4ae") execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:04 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x100000000000000) 08:52:04 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(0x0, 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:04 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x10002, 0x2) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x3c3c, 0x10000}, &(0x7f0000000100)=0x8) 08:52:04 executing program 4: mkdir(0x0, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:04 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x200000000000000) 08:52:04 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) [ 138.191335][ T9533] Invalid argument reading file caps for ./file0 [ 138.232725][ T9534] Invalid argument reading file caps for ./file0 08:52:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r1, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffff8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r5) 08:52:05 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) 08:52:05 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0xa00000000000000) 08:52:05 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(0x0, 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:05 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000000c0)) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) write$tun(r0, &(0x7f0000000340)={@void, @val={0x2, 0x4, 0xc000000000, 0x3, 0xfffffffffffffffd, 0x80}, @llc={@snap={0xaa, 0xab, "dfff", "7ff9dd", 0x889e, "349b12624e893a88836cc6879c2eb9343338225988"}}}, 0x28) socket$rds(0x15, 0x5, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000380)={r1}) recvfrom$inet(r0, &(0x7f0000000000)=""/67, 0x43, 0x10000, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000002c0)={0x0, @speck128, 0x2, "1923f24d0649bbcb"}) r2 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000280)=r2) 08:52:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:05 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(0x0, 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 138.949768][ T9562] Invalid argument reading file caps for ./file0 08:52:05 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x3f00000000000000) [ 139.015214][ T9562] Invalid argument reading file caps for ./file0 08:52:05 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) 08:52:05 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000888}, 0xc, &(0x7f0000000080)={&(0x7f0000000640)={0x378, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x707f7ea}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xeaea}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x85d1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0x118, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x244f6a64}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc00000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000000000000}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x13aa8e16}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7e}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb7f4}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x48}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x219e}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x60, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffffffff800}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1195dc0c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e59}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x378}}, 0x4448000) 08:52:05 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 139.208421][ T9594] Invalid argument reading file caps for ./file0 [ 139.232721][ T9596] Invalid argument reading file caps for ./file0 08:52:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4(r1, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffff8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 08:52:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) 08:52:06 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x4000000000000000) 08:52:06 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:06 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) 08:52:06 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x28000) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=@hopopts={0x3b, 0x7, [], [@hao={0xc9, 0x10, @local}, @enc_lim={0x4, 0x1, 0xe8b5}, @enc_lim={0x4, 0x1, 0x1}, @pad1, @ra={0x5, 0x2, 0x40}, @ra={0x5, 0x2, 0xa5}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x1e}}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xc92e}]}, 0x48) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) [ 139.855361][ T9612] Invalid argument reading file caps for ./file0 [ 139.870718][ T9613] Invalid argument reading file caps for ./file0 08:52:06 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) 08:52:06 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:06 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x8000000000000000) 08:52:06 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x2000, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 139.986576][ T9627] Invalid argument reading file caps for ./file0 08:52:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x9, 0x11, r0, 0x0) [ 140.035574][ T9634] Invalid argument reading file caps for ./file0 08:52:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) accept4(r1, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffff8) 08:52:07 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0xfeffffffffff0700) 08:52:07 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:07 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x8) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x2, 0x5, 0x7fff}) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x0, 0x11, r0, 0x0) 08:52:07 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x0, 0x10, r0, 0x0) [ 140.725001][ T9653] Invalid argument reading file caps for ./file0 08:52:07 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:07 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) preadv(r0, &(0x7f0000000000), 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:07 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0xffffffff00000000) 08:52:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 08:52:07 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 140.941569][ T9679] Invalid argument reading file caps for ./file0 [ 141.012272][ T9689] Invalid argument reading file caps for ./file0 08:52:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) accept4(r1, 0x0, 0x0, 0x0) 08:52:08 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:08 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 08:52:08 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x880, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f0000000140)={r1, &(0x7f00000000c0)=""/91}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000280)="721d687102e68b9a13013f83c02e3553fd822a011ea6865483743f83af112c", 0x1f, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000002c0)={r2, 0x10000, 0x7}, &(0x7f0000000340)={'enc=', 'pkcs1', ' hash=', {'sha512-avx2\x00'}}, &(0x7f00000003c0)="e072365d923f180f1f5696713bbdb9304171d25c34f307731451e0452afe6c48d67ae1a772dfa4f851c49f5dd17667217f4a83fed0", &(0x7f0000000400)=""/84) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:08 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file0', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:08 executing program 3: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 141.566279][ T9702] Invalid argument reading file caps for ./file0 08:52:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0xffffe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 08:52:08 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 08:52:08 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000280)='./file0\x00', 0x26) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x6a, 0x1, 0x2, "60da68564ea97964069ef0d8fa907b4d", "d80b72989a7239c39a4ff79989ced6751d0024460248e4c7b341fbddc60c9a0411207dd22679af4c776a2f7073a26b6b364aad13b6ebad2ac24227272f72107afca9e7a07b7916bb4a966a831f5a87566a5e955e25"}, 0x6a, 0x2) ioctl$DRM_IOCTL_VERSION(r0, 0xc0246400, &(0x7f0000000240)={0x8, 0x115983cc, 0x8000, 0x45, &(0x7f0000000140)=""/69, 0x0, &(0x7f00000001c0), 0x11, &(0x7f0000000200)=""/17}) 08:52:08 executing program 3: socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 141.733171][ T9724] Invalid argument reading file caps for ./file0 08:52:08 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 141.780598][ T9730] Invalid argument reading file caps for ./file0 08:52:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) 08:52:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) accept4(r1, 0x0, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0xfffffffffffffff8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 08:52:09 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x1) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:09 executing program 3: socket$kcm(0x11, 0x7, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:09 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/185, 0xb9) r0 = request_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='security.capability\x00', 0xfffffffffffffff8) keyctl$get_security(0x11, r0, &(0x7f0000000340)=""/190, 0xbe) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 08:52:09 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:09 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0x200000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0xe6, 0x52, &(0x7f0000000400)="8c2701ed78a25aa07062ebbb012d43e79b263ecd621ce89a7563ee8c4043de36acdfde87a3a6a387234f1acb5b80f8286e8196a6ce5046680ba36f153b271ae0ac2310f614e49812fe926ef6688d55f92ac585b7aadcc9377c1b49e147bef58ead4bef94c9d61c827ead05fc59d4e76ab6a9da7b1a8414fe020e1727569f44440c157dace23ad6ec43105492b438e65f19b67e23023dd8c29f56f608ee3d2d9cd0251faf0843a205e680d23616baa022c36a5a5d82bac2237ffdace5cfa1bb45a012471dafc82048b379effee5f9e5b417b148ab09746fd5d408d5d6abcb47ee8fc4cba47efe", &(0x7f0000000500)=""/82, 0x4}, 0x28) getresuid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) write$P9_RSTATu(r0, &(0x7f0000000340)={0x8e, 0x7d, 0x1, {{0x0, 0x52, 0x7fff, 0x3, {0x4, 0x1, 0x6}, 0x100000, 0x0, 0xff, 0x2, 0x1e, 'wlan1eth0*..wlan1-ppp1trusted)', 0x0, '', 0x1, '@'}, 0x27, '$wlan1.userselfproc-GPL/vboxnet0(cgroup', r1, r2, r3}}, 0x8e) r4 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9, 0x11, r4, 0x0) [ 142.457785][ T9752] Invalid argument reading file caps for ./file0 [ 142.486276][ T9757] Invalid argument reading file caps for ./file0 08:52:09 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x42, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x57, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) splice(r3, 0x0, r1, 0x0, 0x0, 0x0) 08:52:09 executing program 3: socket$kcm(0x11, 0x7, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:09 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:09 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000440)={@in6={{0xa, 0x4e21, 0x2, @mcast1, 0x1}}, 0x0, 0x2, 0x0, "de7a3295104354407779133c410c2d7968808158bb6412526538a7a5774b52f32b21d75aef184fe2e9a5d8cbefe3cd8d6571c79d4708c51aceafced84cd43f541ae3ea1c0bdb6fe9e8538df83791adca"}, 0xd8) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x101400) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in=@rand_addr=0x9, @in=@local, 0x4e21, 0x3, 0x4e24, 0x0, 0xa, 0x20, 0xa0, 0x33, 0x0, r2}, {0x5, 0xe37, 0xb, 0x9, 0x809, 0x9724d5c, 0x400, 0x579e}, {0x5, 0x8c2b, 0x6, 0x7}, 0x8, 0x6e6bb2, 0x2, 0x1, 0x1, 0x1}, {{@in=@loopback, 0x4d6, 0xff}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0x26}, 0x0, 0x0, 0x3, 0x2, 0x10000000000, 0x8001, 0xfffffffffffffff9}}, 0xe8) open(&(0x7f0000000180)='./file0\x00', 0x44, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:09 executing program 3: socket$kcm(0x11, 0x7, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 142.795453][ T9783] Invalid argument reading file caps for ./file0 08:52:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/185, 0xb9) r0 = request_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000280)='security.capability\x00', 0xfffffffffffffff8) keyctl$get_security(0x11, r0, &(0x7f0000000340)=""/190, 0xbe) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 08:52:10 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25, 0x2) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) listen(r1, 0x8) 08:52:10 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:10 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:10 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 143.273477][ T9794] Invalid argument reading file caps for ./file0 [ 143.313369][ T9807] Invalid argument reading file caps for ./file0 08:52:10 executing program 2: personality(0x1bb2baf3005ac137) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x123000, 0x0) bind$unix(r0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x8000, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) 08:52:10 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 143.323872][ T9809] Invalid argument reading file caps for ./file0 08:52:10 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) 08:52:10 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x2bd4, 0x4) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:10 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0xb02, 0x70bd29, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010}, 0x8000) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x200000000b, 0x11, r1, 0x1) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0xfff) 08:52:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) 08:52:10 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 143.542624][ T9835] Invalid argument reading file caps for ./file0 [ 143.556138][ T9838] Invalid argument reading file caps for ./file0 08:52:10 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r2, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @empty}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x922}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004811}, 0x1) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:10 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:10 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000040)={&(0x7f0000000000)=[0x100], 0x1, 0x3ff, 0x100000001, 0x71, 0x0, 0x10000, {0x5, 0x1, 0x4, 0xfffffffffffffffa, 0x8, 0x9, 0xffffffffffffb600, 0x42, 0x7f, 0x20, 0x8, 0xfffffffffffff2cd, 0x4, 0x1, "a7c8b9e7f3099bb6a12ce4ab7909430b8cd74fd1e47323843431d466653688d9"}}) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:10 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) 08:52:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) 08:52:10 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:10 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x22) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x9, 0x4) [ 143.762937][ T9860] Invalid argument reading file caps for ./file0 08:52:10 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:10 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000180)=0x1) 08:52:10 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='security.capability\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() keyctl$chown(0x4, r0, r1, r2) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) sysfs$3(0x3) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=[&(0x7f0000000040)='\x00'], &(0x7f0000000100)=[&(0x7f00000000c0)='security.capability\x00']) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) 08:52:10 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:10 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:10 executing program 2: personality(0x1bb2baf3005ac137) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x1, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x100, 0x400) renameat2(r0, &(0x7f0000000140)='./file0/bus\x00', r1, &(0x7f00000001c0)='./file0/bus\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x2200, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000000c0)={0x3f, 0x3, 0x0, {0x3, 0x1e, 0x0, 'cpusetposix_acl_accessGPLwlan0'}}, 0x3f) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) [ 144.065643][ T9893] Invalid argument reading file caps for ./file0 08:52:10 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:10 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x7, 0x10}, &(0x7f0000000280)=0xc) 08:52:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpgrp(0xffffffffffffffff) 08:52:10 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 144.108835][ T9887] Invalid argument reading file caps for ./file0 [ 144.135932][ T9893] Invalid argument reading file caps for ./file0 [ 144.147051][ T9900] Invalid argument reading file caps for ./file0 08:52:10 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 08:52:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:11 executing program 2: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000180)={0xf002, 0x1000}) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getsockname$netlink(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:11 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount(&(0x7f0000000000)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='btrfs\x00', 0x2080000, &(0x7f00000000c0)='!/)lovmnet1lo&ppp0wlan1(securityem0cpuset\x00') setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:11 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) 08:52:11 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 144.322778][ T9929] Invalid argument reading file caps for ./file0 08:52:11 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140), 0x4) 08:52:11 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x620080, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000100)) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={0xffffffffffffff9c, r1}) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) 08:52:11 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 08:52:11 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 08:52:11 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:11 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000100)={0xfff, 'syz1\x00'}) [ 144.533907][ T9952] Invalid argument reading file caps for ./file0 [ 144.551563][ T9957] Invalid argument reading file caps for ./file0 08:52:11 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x200000002) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) lchown(&(0x7f0000000080)='./file0/bus\x00', r2, r3) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 08:52:11 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 08:52:11 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:11 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:11 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 08:52:11 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 144.780986][ T9983] Invalid argument reading file caps for ./file0 08:52:11 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000100)='./file0/bus\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:52:11 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x103204, 0x0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:11 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 08:52:11 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 144.944174][T10005] Invalid argument reading file caps for ./file0 08:52:11 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000240)='./file0/bus\x00', 0x8) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000180)={0x0, 0x3fffc00000, 0x44, &(0x7f0000000100)="254829636bf66a2122109e82803eb85b431666bfa1595314b888854902a4780e645b5bfa2fd344c25718936bd6b89edf22df51473dba74f7e07590808c8c18006acdb7f9"}) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7, @loopback, 0x1f}, {0xa, 0x4e24, 0xffffffffffffffff, @empty, 0x7}, 0x5, [0x2, 0x80000001, 0x0, 0xefc, 0x9, 0x10000, 0x2, 0x10000]}, 0x5c) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x8, 0xa3111, r1, 0x10000000) 08:52:11 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:11 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x301000) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000040)) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x1f, 0x2, 0x7, 0x9, 0x80000001, "d6c370b2b918e898fd63269c3281e5a048b13b", 0x9, 0xdb0}) 08:52:11 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x40000) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:12 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffffff) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000080)={{0x6, @addr=0x3}, 0x8, 0x7, 0x1000}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x8) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:12 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:12 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:12 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r2 = getgid() getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setregid(r2, r3) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000140)=0x9) [ 145.413098][T10056] Invalid argument reading file caps for ./file0 08:52:12 executing program 4: r0 = socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge_slave_0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 145.502986][T10068] Invalid argument reading file caps for ./file0 08:52:12 executing program 5: r0 = open(&(0x7f0000000580)='./file0\x00', 0x2, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="6f73782e73656375726974792e6361706162696c697479004ef6079e34cc6a8c52f98a2d9fdbaee87e47874953823161ec7aac83908cd579dadbd8ea9a1f662d19fd1aa6f5a85b83c67dd05f0ab4d097843b5853f0dfc236217c8b9f090125af50a34ba03210"], &(0x7f0000000080)='\x00', 0x1, 0x3) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000640)=@security={'security\x00', 0xe, 0x4, 0x530, 0x3e0, 0x308, 0x3e0, 0x308, 0x3e0, 0x49c, 0x49c, 0x49c, 0x49c, 0x49c, 0x4, &(0x7f0000000140), {[{{@ip={@multicast1, @broadcast, 0xff, 0xffffffff, 'vcan0\x00', 'ip6erspan0\x00', {}, {0xff}, 0x1da9477341160e25, 0x1, 0x10}, 0x0, 0x2e4, 0x308, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@unspec=@bpf1={0x22c, 'bpf\x00', 0x1, @bytecode={0x0, 0x31, 0x0, [{0x57, 0x5, 0x5, 0x8}, {0x8, 0x9, 0x10000, 0x5}, {0x1, 0x0, 0x6, 0x9}, {0xffffffff, 0x1, 0x8, 0x1}, {0x2, 0x1, 0x100, 0xfffffffffffff13b}, {0x2, 0x4, 0x400, 0x4}, {0x800, 0xffffffff, 0x4ca, 0x3}, {0x40, 0x100, 0x9, 0x7}, {0x6, 0x0, 0xffffffff, 0x200}, {0x38e9, 0x9, 0x81, 0x6}, {0x7, 0x4, 0x80000001, 0x2}, {0x21c7, 0x100000000, 0xfffffffffffffffe, 0x401}, {0x74b4, 0x5dd, 0x80000001, 0x7}, {0x100000000, 0x4, 0x7, 0x6}, {0x0, 0x10001, 0x92}, {0x7, 0x6c, 0x101, 0xffff}, {0x0, 0x7fffffff, 0x8, 0x6}, {0x1, 0x7, 0x0, 0x3}, {0x3, 0x45a7, 0x2, 0x6}, {0x3, 0x8001, 0x5b, 0x6}, {0x7fffffff, 0x3, 0x0, 0x3ff}, {0xc64, 0x7fff, 0x9, 0x59}, {0x5, 0x2, 0x1, 0x1}, {0xffffffffffffffc1, 0x9, 0x47d, 0x1}, {0x9, 0x7ff, 0x4, 0x4}, {0x7f, 0x3ff, 0x9f57, 0xf4}, {0x5, 0x81, 0x1, 0x3f}, {0xffffffff, 0x8, 0x3f, 0x7}, {0x9, 0x1, 0x8000, 0x7800000000}, {0xffff, 0xd6, 0x4, 0x3}, {0x8, 0xff, 0x9, 0x5}, {0x0, 0xffffffffffff79c4, 0x143c, 0x80000000}, {0x6, 0x712, 0x1ff, 0x20}, {0x4, 0x5, 0x61d7, 0xfa3}, {0x9, 0x2, 0x6, 0x9}, {0x0, 0x5a, 0x10001, 0x371069fe}, {0xffffffff, 0x5, 0x39, 0x7}, {0x2183fd3f, 0x8, 0x14000000, 0x26b4}, {0x5, 0x7ff, 0x8, 0x4}, {0xf6, 0x8, 0x52, 0x8}, {0x0, 0xa27, 0x6, 0x9}, {0x4, 0x49, 0x1a, 0x101}, {0x8, 0x8, 0x8000, 0x2}, {0x3ff, 0x1, 0x100, 0x8}, {0x7, 0xfffffffffffffffe, 0x3, 0x4}, {0x7db1, 0x5, 0x2, 0x1f}, {0x4, 0xa6, 0x4, 0x8}, {0x6, 0x6, 0x800, 0x1000}, {0x4, 0x2, 0x4, 0x401}, {0x3, 0x5, 0x100000001, 0x2}, {0x5, 0xffff, 0x8, 0x40}, {0x2, 0x1, 0x4, 0xcd9b}, {0x4, 0xff, 0x19e, 0x30}, {0x10001, 0x4, 0x5, 0x1}, {0x1000, 0xde, 0x40, 0x6}, {0x8, 0x6, 0x9, 0x5}, {0x1, 0x155, 0x3f, 0x3}, {0x10000, 0x1, 0x7}, {0x6, 0x100000000, 0x4, 0x81}, {0x4, 0x7a, 0x0, 0x9f}, {0x4, 0x81, 0x0, 0x5d9a}, {0x9, 0x2, 0x3000000000000, 0xffff}, {0x3, 0x20, 0x6, 0x7}, {0xde2, 0x8001, 0x3f, 0x9}], 0x100}}]}, @common=@inet=@SYNPROXY={0x24, 'SYNPROXY\x00', 0x0, {0x0, 0x3e4, 0x7}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, 0xffffffff, 0x0, 'team_slave_0\x00', 'vlan0\x00', {0xff}, {}, 0x2, 0x2, 0x52}, 0x0, 0x98, 0xd8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "b431bb3fc34f8e897e2583ee5a473d8b3a7f802d7438be90cedc104649b2"}}, {{@uncond, 0x0, 0x98, 0xbc}, @common=@inet=@SYNPROXY={0x24, 'SYNPROXY\x00', 0x0, {0x8, 0x7, 0x8}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x58c) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x208000, 0x0) 08:52:12 executing program 4: socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:12 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 2: personality(0x1bb2baf3005ac137) syz_extract_tcp_res(&(0x7f0000000340), 0x80, 0x800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x513e, 0x6200) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000480)={0xf8, 0xefb, &(0x7f0000000380)="8945bd9e8174eefca54e27d8faa2a057757ef79268dfabff83efa37f9bfe629ae13f7dc3b3aacb3c5c1a10a97dafa0bc2c449925473560a0fa7dd281c286ace1255e4868d9c2f5c858e5222c783f83a4299bf313579506024f7b268d921319517c8264466cee89dce1983e8258ac55e02dccbb8a796db06178ac6fce6fe875496003f82a6f56727625c09c1bc3ffae5df029e63b5375428b3dc27678f88db63a5af88574fbdefa3845905038f3c4f7d1803b9d", &(0x7f0000000440)="e473bb5f53524725afca3ae730d1ab631f292592982e039c82e71b12234f9fd214b0c6461ed18c7a4bbb1a", 0xb3, 0x2b}) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) fchdir(r1) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000080)={[{0x1, 0x8, 0x0, 0x0, 0x1, 0x4, 0x4, 0x33e, 0x0, 0xfff, 0x3f, 0x5, 0x1}, {0x5, 0x7, 0x80000000, 0x200, 0x3, 0x8c95, 0x7fff, 0x2, 0x1, 0x0, 0x7fff, 0x8, 0x9}, {0x5, 0x2, 0x4, 0xa129, 0x4, 0xe27, 0xffffffffffffff00, 0x7fffffff, 0xd09c, 0x1f, 0xde3, 0x1, 0x3}], 0x8}) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x2052, r2, 0x0) setxattr$security_evm(&(0x7f0000000140)='./file0/bus\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="030300000000000600fa51aedc9fb4705899bd56cf165669a8e88eb9117260a380d661dc5f8f01e3cdde4c0cfaab1d5eb5e315c9870104ddc34e7a082c11537c7e5636df3dd6b52bd5638b697752261b0f79b18c501765a6e72f471786e6ce3d04503810fbed95f0d7cf3e94a1924b46a1b1083e5c46fef573f43ad46988bbd1f169b736a7fdc9b3af3c238945b448c93c49987c12c6eed3e1093ffa5761a3565810bbcb22290efe660e99f50b254b2de2b23486fe26f34730f10fb9b54681fe86a99a6b43a7fd481fccd27967bb5e721ad37d83d84f9393218a36de73f93237570b9ca688f66811b6bc8c172cc74bbcb0c2dca31d81333379c5e551c23e7066c5752916"], 0x104, 0x2) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000100)=0x7ed4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) write$P9_RWSTAT(r1, 0x0, 0x0) 08:52:12 executing program 0: socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) 08:52:12 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x18, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:52:12 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 2: personality(0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) r1 = getegid() getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0/bus\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0x5}, [], {0x4, 0x5}, [{0x8, 0x2}, {0x8, 0x7, r1}, {0x8, 0x8180751d51349627, r2}], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x3) 08:52:12 executing program 4: socket$kcm(0x11, 0x7, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 0: socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 145.826022][T10114] Invalid argument reading file caps for ./file0 [ 145.910533][T10122] Invalid argument reading file caps for ./file0 08:52:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) 08:52:12 executing program 4: socket$kcm(0x11, 0x7, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) 08:52:12 executing program 0: socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:12 executing program 2: personality(0x5000004) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) listxattr(&(0x7f0000000080)='./file0/bus\x00', &(0x7f00000000c0)=""/179, 0xb3) r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x7, 0x101000) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000001c0)={0xffff, 0x5, 0x8, 0x2, 0x3392642d}) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000200), &(0x7f0000000240)) 08:52:12 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) 08:52:12 executing program 4: socket$kcm(0x11, 0x7, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x4, 0x101, 0x7fffffff, 0x0, 0x0, 0x8, 0x0, 0x2, 0x240000000000000, 0x7, 0x2, 0x9, 0x7, 0x100, 0x81, 0x0, 0xff, 0x7ff, 0x0, 0xffff, 0x2, 0xd68a, 0x7, 0x81, 0x0, 0x0, 0x3, 0x2, 0x8, 0x8, 0x4, 0x9, 0x0, 0x100000000, 0x5, 0x0, 0x0, 0x7fff, 0x2, @perf_bp={0x0, 0x1}, 0x20c00, 0x4, 0x8, 0x9, 0x9, 0x3, 0x80}, r2, 0x0, r0, 0x2) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) 08:52:12 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) [ 146.175589][T10150] Invalid argument reading file caps for ./file0 [ 146.190476][T10151] Invalid argument reading file caps for ./file0 08:52:12 executing program 3 (fault-call:1 fault-nth:0): clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:13 executing program 2: personality(0x40000) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futimesat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {r1, r2/1000+30000}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bind(r0, &(0x7f0000000280)=@rc={0x1f, {0x1, 0x81, 0x6, 0xfffffffffffffffd, 0x6c36, 0x2}, 0x3f}, 0x80) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000300)=""/182) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='overlay\x00', 0x2040, &(0x7f0000000240)='self\x00') r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) 08:52:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) 08:52:13 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 146.276352][T10160] FAULT_INJECTION: forcing a failure. [ 146.276352][T10160] name failslab, interval 1, probability 0, space 0, times 0 08:52:13 executing program 4: socket$kcm(0x11, 0x7, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 146.378082][T10160] CPU: 1 PID: 10160 Comm: syz-executor.3 Not tainted 5.1.0+ #5 [ 146.385667][T10160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.385673][T10160] Call Trace: [ 146.385695][T10160] dump_stack+0x172/0x1f0 [ 146.385716][T10160] should_fail.cold+0xa/0x15 [ 146.385735][T10160] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 146.385757][T10160] ? ___might_sleep+0x163/0x280 [ 146.385776][T10160] __should_failslab+0x121/0x190 [ 146.385792][T10160] should_failslab+0x9/0x14 [ 146.385813][T10160] kmem_cache_alloc_trace+0x2d1/0x760 [ 146.433414][T10160] ? lock_downgrade+0x880/0x880 [ 146.433434][T10160] perf_event_alloc.part.0+0xbf/0x3230 [ 146.433452][T10160] ? kasan_check_read+0x11/0x20 [ 146.448574][T10160] ? do_raw_spin_unlock+0x57/0x270 [ 146.453695][T10160] ? _raw_spin_unlock+0x2d/0x50 [ 146.458551][T10160] ? __perf_event_read+0xe10/0xe10 [ 146.463668][T10160] __do_sys_perf_event_open+0x830/0x24e0 [ 146.469322][T10160] ? perf_event_set_output+0x4e0/0x4e0 08:52:13 executing program 1 (fault-call:3 fault-nth:0): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:13 executing program 2: personality(0x1bb2baf3005ac137) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x280, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) [ 146.474789][T10160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 146.481050][T10160] ? __ia32_sys_read+0xb0/0xb0 [ 146.485823][T10160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 146.491290][T10160] ? do_fast_syscall_32+0xd1/0xd54 [ 146.496489][T10160] ? entry_SYSENTER_compat+0x70/0x7f [ 146.496512][T10160] ? do_fast_syscall_32+0xd1/0xd54 [ 146.506873][T10160] __ia32_sys_perf_event_open+0xbd/0x140 [ 146.506889][T10160] do_fast_syscall_32+0x281/0xd54 [ 146.506908][T10160] entry_SYSENTER_compat+0x70/0x7f [ 146.506918][T10160] RIP: 0023:0xf7f6b849 [ 146.506932][T10160] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 146.506938][T10160] RSP: 002b:00000000f5d670cc EFLAGS: 00000296 ORIG_RAX: 0000000000000150 [ 146.506950][T10160] RAX: ffffffffffffffda RBX: 00000000200002c0 RCX: 00000000ffffffff [ 146.506958][T10160] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000000 08:52:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) 08:52:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 146.506965][T10160] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 146.506972][T10160] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 146.506979][T10160] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 146.512280][T10178] Invalid argument reading file caps for ./file0 [ 146.555966][T10182] FAULT_INJECTION: forcing a failure. [ 146.555966][T10182] name failslab, interval 1, probability 0, space 0, times 0 08:52:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 146.677911][T10182] CPU: 0 PID: 10182 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 146.685495][T10182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.695561][T10182] Call Trace: [ 146.698865][T10182] dump_stack+0x172/0x1f0 [ 146.700439][T10178] Invalid argument reading file caps for ./file0 [ 146.703199][T10182] should_fail.cold+0xa/0x15 [ 146.703218][T10182] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 146.703242][T10182] ? ___might_sleep+0x163/0x280 [ 146.724771][T10182] __should_failslab+0x121/0x190 [ 146.729722][T10182] should_failslab+0x9/0x14 [ 146.734237][T10182] kmem_cache_alloc+0x2b2/0x6f0 [ 146.739090][T10182] ? fput+0x1b/0x20 [ 146.742904][T10182] ? ksys_write+0x1cf/0x290 [ 146.747419][T10182] getname_flags+0xd6/0x5b0 [ 146.751931][T10182] ? do_fast_syscall_32+0xd1/0xd54 [ 146.754167][T10197] Invalid argument reading file caps for ./file0 [ 146.757051][T10182] __ia32_compat_sys_execveat+0xd4/0x140 [ 146.757073][T10182] do_fast_syscall_32+0x281/0xd54 08:52:13 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000000)=""/186) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:13 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:13 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) r2 = gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xfffffffffffffe52) tgkill(r2, r3, 0x23) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000001c0)={0x2, &(0x7f0000000080)=[{}, {}]}) 08:52:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 146.757096][T10182] entry_SYSENTER_compat+0x70/0x7f [ 146.779141][T10182] RIP: 0023:0xf7f65849 [ 146.783293][T10182] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 146.802900][T10182] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 146.802912][T10182] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 146.802918][T10182] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 08:52:13 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x1, 0xe4d0}]}, 0xc, 0x2) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x8) r1 = getpgrp(0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) 08:52:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 146.802925][T10182] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 146.802931][T10182] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 146.802937][T10182] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 146.883975][T10210] Invalid argument reading file caps for ./file0 [ 146.959353][T10210] Invalid argument reading file caps for ./file0 08:52:13 executing program 1 (fault-call:3 fault-nth:1): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:13 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:13 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x9, 0x4, 0x1f, 0x10000, 0x3, 0x3f, 0x9, 0x3e, 0x40, 0x2e2, 0x4c92, 0xfffffffffffffeff, 0x38, 0x1, 0x800, 0x2bc, 0x4}, [{0x4, 0x5, 0x2, 0xfffffffffffffe01, 0xffff, 0xfff, 0x1, 0x7}, {0x1, 0x8, 0x5, 0x3f, 0xbfb, 0xffffffff, 0x994, 0x7}], "0cad17925dba86e36d10d1ac85a51869571367747f6a9fdcebb879ae0ca713d4a2c222c751a924ff26af5adb999a075c061e9c2308124967cc9935bc30b19160754cd90e95d962c4c2c2013afb4f1c6e0c295186c088a216aeea0878ec66eef2694e9435183f4d52e30ac7f70e2401ec93bdbcdef4a658eb4569fc33af698e9f6fc9adbec974a7b25b0ffcbe578a9e64791451b64241cf363710343869501121cf3fbb8b9ba309044b0bb588ad1770c07e1ace9088cd650b7c77b5140fe913544db6e652f48a5b6b645d0dd6366f616ce23a48743e74ac9da5d2e91252e1", [[], [], [], [], [], [], [], []]}, 0x98e) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000003f80)={@mcast2, 0x0}, &(0x7f0000003fc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000a40)={'vcan0\x00', r2}) sendmsg$kcm(r0, &(0x7f0000003e80)={&(0x7f0000000a80)=@hci={0x1f, r3, 0x3}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000b00)="e5b1a65b84dd38bebd4fce0aaa0efbcd9ce99b", 0x13}, {&(0x7f0000000b40)="458746eec497e08ce1dd307954e04f344f1ffd51cf544ae851913f4d37d716c8f0", 0x21}, {&(0x7f0000000b80)="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", 0x1000}], 0x3, &(0x7f0000001bc0)=[{0x44, 0x104, 0xfffffffffffffffd, "a5edc5d2891d6ff2bb4934811a125a31d8eec621b529ae0e6a024dbaf3545f431f8a8aaace3da62b326efe49c057dd3ddc345ec83b"}, {0x58, 0x0, 0x1, "bceab50e4915322218791f63cc14b59d1b8358bc767e751d646e6fda31a7ee787dc04585a71826925b163dc83d956a3d7043b91ea88a90c68430e58d7219d33e10507baaf4e61a8e2c9d67ec"}, {0x100c, 0x0, 0xc19, "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"}, {0x100c, 0x19f, 0x2, "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"}, {0xdc, 0x1b9, 0xfffffffffffffff9, "373e1cf781732b19337d0d71d9de0f78809481deb422ac8aec5a9305203acb0e10b57223fc36743e8fd34677d923f74551e44f9edfceb1a30d73a88c5d8e1f59a71ca30386e56b1ddc46132564fa683f6ffcff624c3f175a1c6d18b8dbdd60fb1149c5e776ea912bab9fc2b9198b457402ff99d8c132416084ca751fc7c540fa7263275e9afa2a28b5c11aeb45fb75ce8d6af9e7ac12f65b3a690fb78520a6159555889d570cb7372291928b703dc57f0503d63338fba4ff0e9f59398599db794d8fa7ff8f23d706a0ecc6c4282f1b"}, {0x90, 0x119, 0x200, "a27b823bacd08d1573670aaf75015ae84dcf7786d860402c79012f227e661c5d765a961bc99edc19aca1cc09523db67815ddfd1d3ca446f729144e04c041674222c7bb0238e8159ae407badd4a87d2947d80bfaed120000aeadc1ecd9ffa7866637e56f0491255cb4f88df07170449cc7e9e2ec845b2027160dd5ede7748bfd03d56"}, {0x8c, 0x13f, 0x7, "945fdaf7ce233d745e1f4169450a44239ece3a9618a4d40310ea2a15d7346b661a713d322a0130b56e90f52154df4784fa1c08acf4e86246957da440ba923fea37d92e0bd2edbfdf8c55d0f03499ec92c7e7c4bdf185fa70a6ef7db594e341f1666c5a98af6e1dab5b9d2a5062ce66d5153a427a043ee0eec480182affb58d"}], 0x22ac}, 0x1) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) 08:52:13 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x3a1, 0x4}, {0x4, 0xe0}], r0}, 0x18, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 147.107732][T10233] Invalid argument reading file caps for ./file0 [ 147.156610][T10244] FAULT_INJECTION: forcing a failure. [ 147.156610][T10244] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 147.169846][T10244] CPU: 0 PID: 10244 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 147.177393][T10244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.180592][T10246] Invalid argument reading file caps for ./file0 [ 147.187464][T10244] Call Trace: [ 147.187490][T10244] dump_stack+0x172/0x1f0 [ 147.187511][T10244] should_fail.cold+0xa/0x15 [ 147.187527][T10244] ? find_held_lock+0x35/0x130 [ 147.187551][T10244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 147.206048][T10244] should_fail_alloc_page+0x50/0x60 [ 147.206068][T10244] __alloc_pages_nodemask+0x1a1/0x8d0 [ 147.216603][T10244] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 147.216615][T10244] ? find_held_lock+0x35/0x130 [ 147.216639][T10244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 147.243419][T10244] cache_grow_begin+0x9c/0x860 [ 147.248194][T10244] ? getname_flags+0xd6/0x5b0 [ 147.253226][T10244] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 147.259465][T10244] kmem_cache_alloc+0x62d/0x6f0 [ 147.259478][T10244] ? fput+0x1b/0x20 [ 147.259500][T10244] getname_flags+0xd6/0x5b0 [ 147.272618][T10244] ? do_fast_syscall_32+0xd1/0xd54 [ 147.277741][T10244] __ia32_compat_sys_execveat+0xd4/0x140 [ 147.283385][T10244] do_fast_syscall_32+0x281/0xd54 [ 147.288423][T10244] entry_SYSENTER_compat+0x70/0x7f [ 147.293532][T10244] RIP: 0023:0xf7f65849 [ 147.297612][T10244] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 147.317219][T10244] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 147.325640][T10244] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 147.333612][T10244] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 147.341692][T10244] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 147.349666][T10244] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 08:52:14 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0xfffffffffffffc6c, 0x2) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, 'nodev}^vmnet1\xaaem1ppp1'}], 0xa, "061f7bd72222"}, 0x27) 08:52:14 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1000000001) syz_execute_func(&(0x7f0000000040)="0f0143006636df31c4e17f127207d89d00800000c4e3415cfeff66660f38dc87020800000f9f6a00c4e1a9e3ccc4915a00000036263ef0ff09") setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 08:52:14 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x3a1, 0x4}, {0x4, 0xe0}], r0}, 0x18, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:14 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x50000, 0x13) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x3) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f00000000c0)={0x8, 0x0, [{0x0, 0x0, 0x5}, {0xbda, 0x0, 0x100000001}, {0x1db, 0x0, 0xfff}, {0xb1c, 0x0, 0xd08}, {0x0, 0x0, 0x6}, {0xbed, 0x0, 0x2}, {0xb7f, 0x0, 0x2}, {0xfff, 0x0, 0x3ff}]}) personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x8}, 0x10) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) [ 147.357635][T10244] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x20000330, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 147.399399][T10265] Invalid argument reading file caps for ./file0 08:52:14 executing program 1 (fault-call:3 fault-nth:2): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:14 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='security.capability\x00', 0x0, 0xffffffcd, 0x3) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:14 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:52:14 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:14 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 147.663465][T10304] FAULT_INJECTION: forcing a failure. [ 147.663465][T10304] name failslab, interval 1, probability 0, space 0, times 0 08:52:14 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000080)={0x5, "b8006fb3edb277d83be9c456c9462db20773472bb4ab073160dfbdc00d0918d6", 0x1, 0x414b, 0x6, 0x0, 0xe}) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x3) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000100)={0x2, 0x0, [{0x10000, 0x6, 0x0, 0x0, @irqchip={0x1, 0xffffffff}}, {0x9, 0x7, 0x0, 0x0, @adapter={0x8, 0x1ff, 0x2, 0x5, 0x5}}]}) [ 147.704470][T10304] CPU: 1 PID: 10304 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 147.712059][T10304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.722115][T10304] Call Trace: [ 147.725416][T10304] dump_stack+0x172/0x1f0 [ 147.729765][T10304] should_fail.cold+0xa/0x15 [ 147.734370][T10304] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 147.740192][T10304] ? ___might_sleep+0x163/0x280 [ 147.745056][T10304] __should_failslab+0x121/0x190 [ 147.750005][T10304] should_failslab+0x9/0x14 08:52:14 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 147.754515][T10304] kmem_cache_alloc+0x2b2/0x6f0 [ 147.759394][T10304] ? save_stack+0x5c/0x90 [ 147.763731][T10304] dup_fd+0x85/0xb30 [ 147.767629][T10304] ? entry_SYSENTER_compat+0x70/0x7f [ 147.772920][T10304] ? mark_held_locks+0xf0/0xf0 [ 147.777695][T10304] unshare_fd+0x160/0x1d0 [ 147.782037][T10304] ? pidfd_release+0x50/0x50 [ 147.786635][T10304] ? find_held_lock+0x35/0x130 [ 147.791409][T10304] ? cache_grow_end+0xa4/0x190 [ 147.796190][T10304] unshare_files+0x7f/0x1f0 08:52:14 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0x2, 0x4e23, 0x0, @loopback}, 0x1c) [ 147.800719][T10304] ? __ia32_sys_unshare+0x40/0x40 [ 147.805764][T10304] __do_execve_file.isra.0+0x27e/0x23a0 [ 147.811316][T10304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 147.817568][T10304] ? __phys_addr_symbol+0x30/0x70 [ 147.822596][T10304] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 147.828319][T10304] ? __check_object_size+0x3d/0x42f [ 147.833537][T10304] ? copy_strings_kernel+0x110/0x110 [ 147.838829][T10304] ? strncpy_from_user+0x2ac/0x380 [ 147.844300][T10304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:52:14 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0xcb7, 0x8, 0x3368}) setsockopt$inet6_buf(r0, 0x29, 0xff, &(0x7f0000000080)="cb60ede894fc186c0200fb89ebbe3d4b96", 0x11) [ 147.850556][T10304] __ia32_compat_sys_execveat+0xf3/0x140 [ 147.856200][T10304] do_fast_syscall_32+0x281/0xd54 [ 147.861235][T10304] entry_SYSENTER_compat+0x70/0x7f [ 147.866347][T10304] RIP: 0023:0xf7f65849 [ 147.870424][T10304] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 147.890025][T10304] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 08:52:14 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x2, @loopback}, 0x1c) 08:52:14 executing program 1 (fault-call:3 fault-nth:3): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:14 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x2) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) [ 147.898480][T10304] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 147.906462][T10304] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 147.914539][T10304] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 147.922524][T10304] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 147.930503][T10304] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:14 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000100)={0x2a0, r2, 0x24, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'eql\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x5}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x13c5}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcb4d}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x179}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x84}]}, @TIPC_NLA_BEARER={0xc0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xff, @remote, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x5}, 0x4000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000540)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000680)=0xe8) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000740)=0x0, &(0x7f0000000780), &(0x7f00000007c0)) getresgid(&(0x7f0000000800)=0x0, &(0x7f0000000840), &(0x7f0000000880)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000008c0)={0x0}, &(0x7f0000000900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000940)={{{@in=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000a40)=0xe8) lstat(&(0x7f0000000a80)='./file0/bus\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000b40)=0x0) stat(&(0x7f0000000b80)='./file0/bus\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r14 = getgid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000c40)=0x0) r16 = getuid() stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000e00)={&(0x7f0000000440)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f00000004c0)="80d33d128b436ddffa45cf50dd79c2d6261670bd2e507324352e7e9ab3a9ebc6b862d57f14d8e980e605738031b89ca52759dfe6d8ed6511c9", 0x39}], 0x1, &(0x7f0000000d40)=[@rights={0x14, 0x1, 0x1, [r0, r0]}, @cred={0x18, 0x1, 0x2, r3, r4, r5}, @cred={0x18, 0x1, 0x2, r6, r7, r8}, @cred={0x18, 0x1, 0x2, r9, r10, r11}, @cred={0x18, 0x1, 0x2, r12, r13, r14}, @cred={0x18, 0x1, 0x2, r15, r16, r17}], 0x8c, 0x40}, 0x4000080) 08:52:14 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:14 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfc, @loopback}, 0x1c) 08:52:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:14 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) r1 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) ioprio_set$pid(0x3, r1, 0x9) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 148.085612][T10337] FAULT_INJECTION: forcing a failure. [ 148.085612][T10337] name failslab, interval 1, probability 0, space 0, times 0 [ 148.162844][T10352] Invalid argument reading file caps for ./file0 [ 148.182956][T10337] CPU: 1 PID: 10337 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 148.190537][T10337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.200597][T10337] Call Trace: [ 148.203901][T10337] dump_stack+0x172/0x1f0 [ 148.208245][T10337] should_fail.cold+0xa/0x15 08:52:14 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x80fe, @loopback}, 0x1c) 08:52:15 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x400002, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000080)) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f00000000c0), 0x4) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) [ 148.212850][T10337] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 148.218670][T10337] ? ___might_sleep+0x163/0x280 [ 148.223528][T10337] __should_failslab+0x121/0x190 [ 148.228475][T10337] should_failslab+0x9/0x14 [ 148.233000][T10337] kmem_cache_alloc_trace+0x2d1/0x760 [ 148.238380][T10337] ? lock_downgrade+0x880/0x880 [ 148.243241][T10337] alloc_fdtable+0x86/0x290 [ 148.247743][T10337] dup_fd+0x743/0xb30 [ 148.247767][T10337] unshare_fd+0x160/0x1d0 [ 148.247782][T10337] ? pidfd_release+0x50/0x50 [ 148.247795][T10337] ? find_held_lock+0x35/0x130 [ 148.247810][T10337] ? cache_grow_end+0xa4/0x190 [ 148.247829][T10337] unshare_files+0x7f/0x1f0 [ 148.270207][T10337] ? __ia32_sys_unshare+0x40/0x40 [ 148.270234][T10337] __do_execve_file.isra.0+0x27e/0x23a0 [ 148.285255][T10337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 148.291521][T10337] ? __phys_addr_symbol+0x30/0x70 [ 148.291537][T10337] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 148.291557][T10337] ? __check_object_size+0x3d/0x42f [ 148.307437][T10337] ? copy_strings_kernel+0x110/0x110 [ 148.312709][T10337] ? strncpy_from_user+0x2ac/0x380 [ 148.317811][T10337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 148.324041][T10337] __ia32_compat_sys_execveat+0xf3/0x140 [ 148.329666][T10337] do_fast_syscall_32+0x281/0xd54 [ 148.334691][T10337] entry_SYSENTER_compat+0x70/0x7f [ 148.340423][T10337] RIP: 0023:0xf7f65849 08:52:15 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x400000040, 0x24) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x521100, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 148.344486][T10337] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 148.364156][T10337] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 148.372546][T10337] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 148.380771][T10337] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 148.388811][T10337] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 148.396763][T10337] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 148.404727][T10337] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:15 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:15 executing program 1 (fault-call:3 fault-nth:4): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:15 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xc0fe, @loopback}, 0x1c) 08:52:15 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000340)={0x8, 0x120, 0xfa00, {0x1, {0x8, 0x9, "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", 0x39, 0x100000001, 0x4966, 0x6, 0x5, 0x0, 0x7ff}, r1}}, 0x128) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x14, 0x200) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:15 executing program 2: personality(0x1bb2baf3005ac137) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xf85, 0x101080) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x0) pread64(r1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) 08:52:15 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:15 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfc00, @loopback}, 0x1c) 08:52:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:15 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 148.701525][T10389] Invalid argument reading file caps for ./file0 [ 148.710351][T10396] FAULT_INJECTION: forcing a failure. [ 148.710351][T10396] name failslab, interval 1, probability 0, space 0, times 0 08:52:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:15 executing program 2: personality(0x1bb2baf3005ac137) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) timerfd_gettime(r0, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:15 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mknod(&(0x7f0000000000)='./file0\x00', 0x4, 0x2) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 148.755429][T10396] CPU: 1 PID: 10396 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 148.763013][T10396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.773075][T10396] Call Trace: [ 148.776379][T10396] dump_stack+0x172/0x1f0 [ 148.780721][T10396] should_fail.cold+0xa/0x15 [ 148.785320][T10396] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 148.791145][T10396] ? ___might_sleep+0x163/0x280 [ 148.796003][T10396] __should_failslab+0x121/0x190 [ 148.796023][T10396] should_failslab+0x9/0x14 [ 148.796041][T10396] kmem_cache_alloc_node_trace+0x270/0x720 [ 148.796066][T10396] __kmalloc_node+0x3d/0x70 [ 148.805479][T10396] kvmalloc_node+0x68/0x100 [ 148.805497][T10396] alloc_fdtable+0xd6/0x290 [ 148.805514][T10396] dup_fd+0x743/0xb30 [ 148.805539][T10396] unshare_fd+0x160/0x1d0 [ 148.805555][T10396] ? pidfd_release+0x50/0x50 [ 148.805573][T10396] ? find_held_lock+0x35/0x130 [ 148.842428][T10396] ? cache_grow_end+0xa4/0x190 [ 148.847210][T10396] unshare_files+0x7f/0x1f0 [ 148.851722][T10396] ? __ia32_sys_unshare+0x40/0x40 [ 148.856762][T10396] __do_execve_file.isra.0+0x27e/0x23a0 [ 148.862305][T10396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 148.868558][T10396] ? __phys_addr_symbol+0x30/0x70 [ 148.869347][T10415] Invalid argument reading file caps for ./file0 [ 148.873580][T10396] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 148.873596][T10396] ? __check_object_size+0x3d/0x42f [ 148.873618][T10396] ? copy_strings_kernel+0x110/0x110 [ 148.896174][T10396] ? strncpy_from_user+0x2ac/0x380 [ 148.901295][T10396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 148.907546][T10396] __ia32_compat_sys_execveat+0xf3/0x140 [ 148.913191][T10396] do_fast_syscall_32+0x281/0xd54 [ 148.918225][T10396] entry_SYSENTER_compat+0x70/0x7f [ 148.923344][T10396] RIP: 0023:0xf7f65849 [ 148.927417][T10396] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 148.947023][T10396] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 08:52:15 executing program 1 (fault-call:3 fault-nth:5): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:15 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:15 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfe80, @loopback}, 0x1c) 08:52:15 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) [ 148.947038][T10396] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 148.947046][T10396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 148.947053][T10396] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 148.947060][T10396] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 148.947067][T10396] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:15 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x2040000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 149.020985][T10427] Invalid argument reading file caps for ./file0 08:52:15 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfec0, @loopback}, 0x1c) 08:52:15 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:15 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x180) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 149.065151][T10438] Invalid argument reading file caps for ./file0 [ 149.077075][T10433] FAULT_INJECTION: forcing a failure. [ 149.077075][T10433] name failslab, interval 1, probability 0, space 0, times 0 08:52:15 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffff9c) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000100)={0x7, 0x7b, 0x1}, 0x7) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000000c0)=0x7) 08:52:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 149.183513][T10433] CPU: 0 PID: 10433 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 149.191089][T10433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.201149][T10433] Call Trace: [ 149.204460][T10433] dump_stack+0x172/0x1f0 [ 149.208801][T10433] should_fail.cold+0xa/0x15 [ 149.213419][T10433] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 149.219242][T10433] ? ___might_sleep+0x163/0x280 [ 149.224107][T10433] __should_failslab+0x121/0x190 [ 149.229059][T10433] should_failslab+0x9/0x14 [ 149.233572][T10433] kmem_cache_alloc_node_trace+0x270/0x720 [ 149.239384][T10433] ? kasan_unpoison_shadow+0x35/0x50 [ 149.244676][T10433] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 149.250495][T10433] __kmalloc_node+0x3d/0x70 [ 149.255007][T10433] kvmalloc_node+0x68/0x100 [ 149.259518][T10433] alloc_fdtable+0x142/0x290 [ 149.264104][T10433] dup_fd+0x743/0xb30 [ 149.264132][T10433] unshare_fd+0x160/0x1d0 [ 149.264148][T10433] ? pidfd_release+0x50/0x50 [ 149.264168][T10433] ? find_held_lock+0x35/0x130 [ 149.272448][T10433] ? cache_grow_end+0xa4/0x190 [ 149.272471][T10433] unshare_files+0x7f/0x1f0 [ 149.272485][T10433] ? __ia32_sys_unshare+0x40/0x40 [ 149.272511][T10433] __do_execve_file.isra.0+0x27e/0x23a0 [ 149.281817][T10433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 149.281834][T10433] ? __phys_addr_symbol+0x30/0x70 [ 149.281847][T10433] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 149.281866][T10433] ? __check_object_size+0x3d/0x42f [ 149.323770][T10433] ? copy_strings_kernel+0x110/0x110 [ 149.329068][T10433] ? strncpy_from_user+0x2ac/0x380 [ 149.334192][T10433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.340444][T10433] __ia32_compat_sys_execveat+0xf3/0x140 [ 149.346090][T10433] do_fast_syscall_32+0x281/0xd54 [ 149.351128][T10433] entry_SYSENTER_compat+0x70/0x7f [ 149.356237][T10433] RIP: 0023:0xf7f65849 [ 149.360304][T10433] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 149.379897][T10433] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 149.379911][T10433] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 149.379919][T10433] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 149.379927][T10433] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 149.379933][T10433] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 149.379940][T10433] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:16 executing program 1 (fault-call:3 fault-nth:6): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:16 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:16 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:16 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/bus\x00', 0x40000, 0x102) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x7) socketpair(0x2, 0x80007, 0x2b6b, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @remote}, @in6={0xa, 0x4e23, 0x7, @local, 0x7f}, @in6={0xa, 0x4e23, 0x8, @empty, 0x40}, @in6={0xa, 0x4e22, 0x2, @empty, 0x4}, @in={0x2, 0x4e22, @loopback}], 0x74) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getpid() mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) 08:52:16 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x44, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:16 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xff00, @loopback}, 0x1c) [ 149.501306][T10476] Invalid argument reading file caps for ./file0 08:52:16 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:16 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x2000000, @loopback}, 0x1c) 08:52:16 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:16 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) write$P9_RLOCK(r0, &(0x7f0000000080)={0x8, 0x35, 0x2}, 0x8) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x8) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) [ 149.546987][T10486] Invalid argument reading file caps for ./file0 [ 149.576555][T10487] FAULT_INJECTION: forcing a failure. [ 149.576555][T10487] name failslab, interval 1, probability 0, space 0, times 0 08:52:16 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@ng={0x4, 0xf, "80d33e910865b0a5d06a93017d"}, 0xf, 0x2) 08:52:16 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfc000000, @loopback}, 0x1c) [ 149.721119][T10487] CPU: 1 PID: 10487 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 149.728703][T10487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.738762][T10487] Call Trace: [ 149.742064][T10487] dump_stack+0x172/0x1f0 [ 149.746421][T10487] should_fail.cold+0xa/0x15 [ 149.751049][T10487] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 149.756870][T10487] ? ___might_sleep+0x163/0x280 [ 149.761736][T10487] __should_failslab+0x121/0x190 [ 149.766688][T10487] should_failslab+0x9/0x14 [ 149.771196][T10487] kmem_cache_alloc_trace+0x2d1/0x760 [ 149.776572][T10487] __do_execve_file.isra.0+0x325/0x23a0 [ 149.776588][T10487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 149.776603][T10487] ? __phys_addr_symbol+0x30/0x70 [ 149.776615][T10487] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 149.776628][T10487] ? __check_object_size+0x3d/0x42f [ 149.776648][T10487] ? copy_strings_kernel+0x110/0x110 [ 149.804395][T10487] ? strncpy_from_user+0x2ac/0x380 [ 149.804417][T10487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 149.804436][T10487] __ia32_compat_sys_execveat+0xf3/0x140 [ 149.804457][T10487] do_fast_syscall_32+0x281/0xd54 [ 149.804477][T10487] entry_SYSENTER_compat+0x70/0x7f [ 149.804493][T10487] RIP: 0023:0xf7f65849 [ 149.821075][T10487] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 149.821084][T10487] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 149.868901][T10487] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 149.876902][T10487] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 149.884874][T10487] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 149.892838][T10487] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 149.892853][T10487] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:16 executing program 1 (fault-call:3 fault-nth:7): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:16 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:16 executing program 2: personality(0x400000b) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000000c0)={0x4, &(0x7f0000000080), 0xe, r0, 0xa}) 08:52:16 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:16 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfe800000, @loopback}, 0x1c) 08:52:16 executing program 5: r0 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x80000) ioctl$sock_netdev_private(r0, 0x89f0, &(0x7f0000000340)="55d6980e8866f09143fcc05327450ce1e113d433866a0454cc59821e7cfccd80013e13406d0bea9358db08ade642cdf7a5ad42c566582f64631177dbb906fc5a224ca31382fe6e91ada648b6190e5473ab2466a23a90d8ff03f6d3bbffb99cf7f166d5b78a168c1b7b5a324c5442b67c19b9a2e10a6d1da1486fe0cd4e051c0c6fad3a1c096057bada0eedf8c759a425ae7ce534dc919245ac331a3ff267b1c65a259f7f019091385220e586dd7e97e748f7fdad63d273ee542fbab5bab117cdc53e778dc33423010f4dd5a9a61385aed4c89e0611938d16be22214f168794825986064db682fe7c0fd40fd9ddc480caa1f8a33d5cad41") r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xfff, 0x2667a2c800000, 0x7f, 0xfe2, 0x0, 0x2, 0x48400, 0xd, 0x8, 0x7, 0x6, 0xf6, 0x10001, 0x2, 0x464da0d5, 0xff, 0x2, 0x3, 0x101, 0x1, 0x1, 0x5, 0xffffffff, 0x1, 0x4, 0xff, 0x20, 0xc6c, 0x1ff, 0x7fffffff, 0x101, 0x81, 0x4, 0x1f00000000, 0x0, 0x4, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f00000000c0), 0x6}, 0x20000, 0x401, 0x8, 0x4, 0x50520d9, 0x6}, r2, 0xd, r1, 0x8) 08:52:16 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:16 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f00000011c0)='./file0\x00', 0x10) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000001200)='./file0/bus\x00', 0x0, 0x0) timer_create(0x1, &(0x7f0000001100)={0x0, 0x3d, 0x1, @thr={&(0x7f00000000c0)="ed3924800bf9acbb58962c23d1d5bb016c8a3ec77661618cd29138bcb2b3e195", &(0x7f0000000100)="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"}}, &(0x7f0000001140)=0x0) timer_getoverrun(r2) sysfs$1(0x1, &(0x7f0000001180)='eth0vmnet0eth0\xba\xe1\'\x00') mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0xee5) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)=0xec9) 08:52:16 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfec00000, @loopback}, 0x1c) [ 150.030013][T10532] Invalid argument reading file caps for ./file0 [ 150.039805][T10534] FAULT_INJECTION: forcing a failure. [ 150.039805][T10534] name failslab, interval 1, probability 0, space 0, times 0 08:52:16 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 150.071018][T10535] Invalid argument reading file caps for ./file0 [ 150.119775][T10534] CPU: 1 PID: 10534 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 150.127370][T10534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.137436][T10534] Call Trace: [ 150.140738][T10534] dump_stack+0x172/0x1f0 [ 150.145082][T10534] should_fail.cold+0xa/0x15 [ 150.149687][T10534] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 150.155513][T10534] ? ___might_sleep+0x163/0x280 [ 150.160397][T10534] __should_failslab+0x121/0x190 [ 150.165356][T10534] should_failslab+0x9/0x14 08:52:16 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x204000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 150.169868][T10534] kmem_cache_alloc+0x2b2/0x6f0 [ 150.174732][T10534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.180978][T10534] ? __validate_process_creds+0x22d/0x380 [ 150.186709][T10534] prepare_creds+0x3e/0x3f0 [ 150.191219][T10534] prepare_exec_creds+0x12/0xf0 [ 150.196082][T10534] __do_execve_file.isra.0+0x393/0x23a0 [ 150.201627][T10534] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 150.207871][T10534] ? __phys_addr_symbol+0x30/0x70 [ 150.212892][T10534] ? __sanitizer_cov_trace_cmp8+0x18/0x20 08:52:16 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x25, 0x36, 0xd, 0x17, 0x0, 0x2a6d67d2, 0x4, 0x11, 0xa4dc5e1c46c0bd76}) [ 150.212910][T10534] ? __check_object_size+0x3d/0x42f [ 150.212933][T10534] ? copy_strings_kernel+0x110/0x110 [ 150.229092][T10534] ? strncpy_from_user+0x2ac/0x380 [ 150.234208][T10534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.234233][T10534] __ia32_compat_sys_execveat+0xf3/0x140 [ 150.234253][T10534] do_fast_syscall_32+0x281/0xd54 [ 150.234276][T10534] entry_SYSENTER_compat+0x70/0x7f [ 150.234289][T10534] RIP: 0023:0xf7f65849 [ 150.234304][T10534] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 150.234310][T10534] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 150.234333][T10534] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 150.234339][T10534] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 150.234346][T10534] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 150.234352][T10534] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 150.234359][T10534] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:17 executing program 1 (fault-call:3 fault-nth:8): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:17 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xff000000, @loopback}, 0x1c) 08:52:17 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000000)=0x100000000) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:17 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:17 executing program 2: personality(0x6000012) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x8040, 0x3) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000000c0)) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0xc0813, r1, 0x2000) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000080)={0x4, 0xf38, 0x1}) [ 150.421809][T10565] Invalid argument reading file caps for ./file0 08:52:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:17 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{}, {}]}) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14, 0x80800) getpeername$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[], @ANYRES32=r1, @ANYBLOB="080001005fdcd97bf1d0592b7b940fdc0455510000000000000000ad2eaa16465afe27221def03000600fb92fc6430ee452bc78e83f1f6ea7a1f3577db02bdc7c193a489eae6a1458149d64cbf49d5bb6f8190e3d90e417d79762123f9c549b18d9949", @ANYRES32=r2, @ANYBLOB="0800060001000100000000"], 0x5}, 0x1, 0x0, 0x0, 0x4000000}, 0x44) 08:52:17 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x200000000000000, @loopback}, 0x1c) [ 150.492221][T10581] FAULT_INJECTION: forcing a failure. [ 150.492221][T10581] name failslab, interval 1, probability 0, space 0, times 0 08:52:17 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:17 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0xfffffffffffffffd) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @local}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) recvfrom(r0, &(0x7f0000000080)=""/24, 0x18, 0x2, &(0x7f00000000c0)=@xdp={0x2c, 0x1, r1, 0xd}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @ib={0x1b, 0x1, 0x5, {"c0ed3c4952b93954c7177b1942db66e2"}, 0xf8b, 0x1, 0x80000001}}}, 0x90) r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0xd) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) 08:52:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 150.584287][T10581] CPU: 1 PID: 10581 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 150.591881][T10581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.601944][T10581] Call Trace: [ 150.605251][T10581] dump_stack+0x172/0x1f0 [ 150.610328][T10581] should_fail.cold+0xa/0x15 [ 150.614421][T10592] Invalid argument reading file caps for ./file0 [ 150.614929][T10581] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 150.627044][T10581] ? ___might_sleep+0x163/0x280 [ 150.631904][T10581] __should_failslab+0x121/0x190 [ 150.636850][T10581] should_failslab+0x9/0x14 [ 150.641356][T10581] __kmalloc+0x2dc/0x740 [ 150.645691][T10581] ? refcount_inc_not_zero_checked+0x144/0x200 [ 150.651849][T10581] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 150.657660][T10581] ? security_prepare_creds+0x123/0x190 [ 150.663220][T10581] security_prepare_creds+0x123/0x190 [ 150.665941][T10592] Invalid argument reading file caps for ./file0 [ 150.668597][T10581] prepare_creds+0x2f5/0x3f0 [ 150.668616][T10581] prepare_exec_creds+0x12/0xf0 [ 150.668640][T10581] __do_execve_file.isra.0+0x393/0x23a0 [ 150.689886][T10581] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 150.696131][T10581] ? __phys_addr_symbol+0x30/0x70 [ 150.701158][T10581] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 150.706886][T10581] ? __check_object_size+0x3d/0x42f [ 150.712095][T10581] ? copy_strings_kernel+0x110/0x110 [ 150.717386][T10581] ? strncpy_from_user+0x2ac/0x380 [ 150.722509][T10581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 150.728761][T10581] __ia32_compat_sys_execveat+0xf3/0x140 [ 150.734402][T10581] do_fast_syscall_32+0x281/0xd54 [ 150.739436][T10581] entry_SYSENTER_compat+0x70/0x7f [ 150.744545][T10581] RIP: 0023:0xf7f65849 [ 150.748614][T10581] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 150.768218][T10581] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 150.776633][T10581] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 150.784621][T10581] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 150.792580][T10581] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 150.792593][T10581] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 150.808502][T10581] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:17 executing program 1 (fault-call:3 fault-nth:9): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:17 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfc00000000000000, @loopback}, 0x1c) 08:52:17 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:17 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x1) r1 = open$dir(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10) bind$tipc(r0, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x5}) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r3) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)={r2}) 08:52:17 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 150.903548][T10616] Invalid argument reading file caps for ./file0 08:52:17 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:17 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 150.950194][T10625] FAULT_INJECTION: forcing a failure. [ 150.950194][T10625] name failslab, interval 1, probability 0, space 0, times 0 [ 150.989290][T10625] CPU: 0 PID: 10625 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 150.996877][T10625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.006942][T10625] Call Trace: [ 151.010249][T10625] dump_stack+0x172/0x1f0 [ 151.014611][T10625] should_fail.cold+0xa/0x15 [ 151.019220][T10625] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 151.025055][T10625] ? ___might_sleep+0x163/0x280 [ 151.029909][T10625] __should_failslab+0x121/0x190 [ 151.034832][T10625] should_failslab+0x9/0x14 [ 151.039328][T10625] kmem_cache_alloc+0x2b2/0x6f0 [ 151.044175][T10625] ? __kernel_text_address+0xd/0x40 [ 151.049362][T10625] ? unwind_get_return_address+0x61/0xa0 [ 151.054987][T10625] ? profile_setup.cold+0xbb/0xbb [ 151.060014][T10625] __alloc_file+0x27/0x300 [ 151.064440][T10625] alloc_empty_file+0x72/0x170 [ 151.069211][T10625] path_openat+0xef/0x46e0 [ 151.073612][T10625] ? stack_trace_save+0xac/0xe0 [ 151.078441][T10625] ? stack_trace_consume_entry+0x190/0x190 [ 151.084228][T10625] ? stack_trace_save+0xac/0xe0 [ 151.089070][T10625] ? save_stack+0x5c/0x90 [ 151.093387][T10625] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 151.098744][T10625] ? __kmalloc+0x15c/0x740 [ 151.103144][T10625] ? security_prepare_creds+0x123/0x190 [ 151.108674][T10625] ? prepare_creds+0x2f5/0x3f0 [ 151.113413][T10625] ? prepare_exec_creds+0x12/0xf0 [ 151.118432][T10625] ? __do_execve_file.isra.0+0x393/0x23a0 [ 151.124133][T10625] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 151.129920][T10625] ? do_fast_syscall_32+0x281/0xd54 [ 151.135100][T10625] ? entry_SYSENTER_compat+0x70/0x7f [ 151.140362][T10625] ? save_stack+0x23/0x90 [ 151.144691][T10625] do_filp_open+0x1a1/0x280 [ 151.149197][T10625] ? may_open_dev+0x100/0x100 [ 151.153860][T10625] ? __lock_acquire+0x54f/0x5490 [ 151.158783][T10625] ? mark_held_locks+0xf0/0xf0 [ 151.163524][T10625] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 151.169311][T10625] do_open_execat+0x137/0x690 [ 151.173968][T10625] ? unregister_binfmt+0x170/0x170 [ 151.179071][T10625] ? lock_downgrade+0x880/0x880 [ 151.183904][T10625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.190126][T10625] ? kasan_check_read+0x11/0x20 [ 151.194956][T10625] ? do_raw_spin_unlock+0x57/0x270 [ 151.200080][T10625] __do_execve_file.isra.0+0x178d/0x23a0 [ 151.205707][T10625] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 151.211949][T10625] ? copy_strings_kernel+0x110/0x110 [ 151.217232][T10625] ? strncpy_from_user+0x2ac/0x380 [ 151.222350][T10625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.228684][T10625] __ia32_compat_sys_execveat+0xf3/0x140 [ 151.234320][T10625] do_fast_syscall_32+0x281/0xd54 [ 151.239329][T10625] entry_SYSENTER_compat+0x70/0x7f [ 151.244420][T10625] RIP: 0023:0xf7f65849 [ 151.248484][T10625] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 151.268102][T10625] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 151.276845][T10625] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 151.284817][T10625] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 151.292772][T10625] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 08:52:18 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8000, 0x40000) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000080)) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x2) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:18 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfe80000000000000, @loopback}, 0x1c) [ 151.300746][T10625] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 151.308698][T10625] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:18 executing program 1 (fault-call:3 fault-nth:10): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:18 executing program 2: personality(0x1bb2baf3005ac137) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = getpgrp(0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000000c0)={[], 0x8001, 0x52, 0xfffffffffffffa94, 0x5, 0x100000001, r1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) 08:52:18 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, r1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x14, &(0x7f0000000000)='security.capability\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r2, 0x4) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:18 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 151.417667][T10646] FAULT_INJECTION: forcing a failure. [ 151.417667][T10646] name failslab, interval 1, probability 0, space 0, times 0 [ 151.458971][T10646] CPU: 0 PID: 10646 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 151.466568][T10646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.466575][T10646] Call Trace: [ 151.466597][T10646] dump_stack+0x172/0x1f0 [ 151.466624][T10646] should_fail.cold+0xa/0x15 [ 151.488861][T10646] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 151.490595][T10653] Invalid argument reading file caps for ./file0 [ 151.494676][T10646] ? ___might_sleep+0x163/0x280 [ 151.494697][T10646] __should_failslab+0x121/0x190 [ 151.494716][T10646] should_failslab+0x9/0x14 [ 151.516024][T10646] kmem_cache_alloc+0x2b2/0x6f0 [ 151.520879][T10646] ? rcu_read_lock_sched_held+0x110/0x130 [ 151.526601][T10646] ? kmem_cache_alloc+0x32e/0x6f0 [ 151.526626][T10646] security_file_alloc+0x39/0x170 [ 151.526645][T10646] __alloc_file+0xac/0x300 [ 151.541097][T10646] alloc_empty_file+0x72/0x170 [ 151.545875][T10646] path_openat+0xef/0x46e0 [ 151.550387][T10646] ? stack_trace_save+0xac/0xe0 [ 151.555333][T10646] ? stack_trace_consume_entry+0x190/0x190 [ 151.561154][T10646] ? stack_trace_save+0xac/0xe0 [ 151.566102][T10646] ? save_stack+0x5c/0x90 [ 151.570445][T10646] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 151.575823][T10646] ? __kmalloc+0x15c/0x740 [ 151.580256][T10646] ? security_prepare_creds+0x123/0x190 [ 151.585808][T10646] ? prepare_creds+0x2f5/0x3f0 [ 151.590579][T10646] ? prepare_exec_creds+0x12/0xf0 [ 151.595636][T10646] ? __do_execve_file.isra.0+0x393/0x23a0 [ 151.599523][T10665] Invalid argument reading file caps for ./file0 [ 151.601359][T10646] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 151.601376][T10646] ? do_fast_syscall_32+0x281/0xd54 [ 151.601390][T10646] ? entry_SYSENTER_compat+0x70/0x7f [ 151.601407][T10646] ? save_stack+0x23/0x90 [ 151.622189][T10665] Invalid argument reading file caps for ./file0 [ 151.623974][T10646] do_filp_open+0x1a1/0x280 [ 151.623992][T10646] ? may_open_dev+0x100/0x100 [ 151.624012][T10646] ? __lock_acquire+0x54f/0x5490 [ 151.624045][T10646] ? mark_held_locks+0xf0/0xf0 [ 151.653591][T10646] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 151.659426][T10646] do_open_execat+0x137/0x690 [ 151.664119][T10646] ? unregister_binfmt+0x170/0x170 [ 151.669249][T10646] ? lock_downgrade+0x880/0x880 [ 151.674110][T10646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.680357][T10646] ? kasan_check_read+0x11/0x20 [ 151.685224][T10646] ? do_raw_spin_unlock+0x57/0x270 [ 151.686017][T10671] Invalid argument reading file caps for ./file0 [ 151.690343][T10646] __do_execve_file.isra.0+0x178d/0x23a0 [ 151.690360][T10646] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 151.690382][T10646] ? copy_strings_kernel+0x110/0x110 [ 151.690401][T10646] ? strncpy_from_user+0x2ac/0x380 [ 151.710437][T10672] Invalid argument reading file caps for ./file0 [ 151.713832][T10646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.713854][T10646] __ia32_compat_sys_execveat+0xf3/0x140 [ 151.713880][T10646] do_fast_syscall_32+0x281/0xd54 [ 151.742151][T10646] entry_SYSENTER_compat+0x70/0x7f [ 151.747262][T10646] RIP: 0023:0xf7f65849 08:52:18 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:18 executing program 5: lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.apparmor\x00', &(0x7f00000000c0)='\x00', 0x0, 0x2) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 08:52:18 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xe, 0x2000000004, 0x100000001, 0x0, r1}, 0x3c) dup2(r1, r2) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000001340)={r2, &(0x7f0000000040)}, 0x10) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:52:18 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000080)={r1, 0x26}) 08:52:18 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) io_setup(0x20, &(0x7f0000000080)=0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x6, r1, &(0x7f0000000100)="04dd1c", 0x3, 0x5, 0x0, 0x2, r2}, &(0x7f00000001c0)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000000200)=0x3, 0x4) 08:52:18 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000000)) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 151.751338][T10646] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 151.758133][T10677] Invalid argument reading file caps for ./file0 [ 151.771035][T10646] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 151.771049][T10646] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 151.771058][T10646] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 151.771066][T10646] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 08:52:18 executing program 1 (fault-call:3 fault-nth:11): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:18 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xfec0000000000000, @loopback}, 0x1c) [ 151.771074][T10646] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 151.771082][T10646] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:18 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xff00000000000000, @loopback}, 0x1c) [ 151.852154][T10685] FAULT_INJECTION: forcing a failure. [ 151.852154][T10685] name failslab, interval 1, probability 0, space 0, times 0 [ 151.871531][T10685] CPU: 1 PID: 10685 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 151.879105][T10685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.889163][T10685] Call Trace: [ 151.892473][T10685] dump_stack+0x172/0x1f0 [ 151.896815][T10685] should_fail.cold+0xa/0x15 08:52:18 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x20007e, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000080)={0x5, 0x5, 0x1, 0x3b, 'syz0\x00', 0x10001}) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) [ 151.901425][T10685] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 151.907245][T10685] ? ___might_sleep+0x163/0x280 [ 151.912113][T10685] __should_failslab+0x121/0x190 [ 151.917057][T10685] should_failslab+0x9/0x14 [ 151.921575][T10685] __kmalloc_track_caller+0x2d8/0x740 [ 151.926946][T10685] ? pointer+0x870/0x870 [ 151.931200][T10685] ? kasan_check_read+0x11/0x20 [ 151.936059][T10685] ? sched_exec+0x1cc/0x260 [ 151.940577][T10685] ? kasprintf+0xbb/0xf0 [ 151.944827][T10685] kvasprintf+0xc8/0x170 08:52:18 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x2}}, 0x1c) [ 151.949070][T10685] ? bust_spinlocks+0xe0/0xe0 [ 151.953769][T10685] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 151.959591][T10685] ? sched_exec+0x1cc/0x260 [ 151.964101][T10685] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 151.969906][T10685] ? lockdep_hardirqs_on+0x418/0x5d0 [ 151.975206][T10685] kasprintf+0xbb/0xf0 [ 151.975223][T10685] ? kvasprintf_const+0x190/0x190 [ 151.975243][T10685] ? nr_iowait+0x130/0x130 [ 151.975263][T10685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.984320][T10685] ? kasan_check_read+0x11/0x20 [ 151.984342][T10685] __do_execve_file.isra.0+0x94b/0x23a0 [ 151.984357][T10685] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 151.984381][T10685] ? copy_strings_kernel+0x110/0x110 [ 151.984395][T10685] ? strncpy_from_user+0x2ac/0x380 [ 151.984414][T10685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 151.984430][T10685] __ia32_compat_sys_execveat+0xf3/0x140 [ 151.984455][T10685] do_fast_syscall_32+0x281/0xd54 [ 152.005450][T10685] entry_SYSENTER_compat+0x70/0x7f [ 152.005463][T10685] RIP: 0023:0xf7f65849 [ 152.005478][T10685] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 152.005486][T10685] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 152.005500][T10685] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 152.005508][T10685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 152.005515][T10685] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 152.005523][T10685] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 152.005530][T10685] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:18 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:19 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:19 executing program 1 (fault-call:3 fault-nth:12): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfc}}, 0x1c) 08:52:19 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000080)="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") r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000001080)='/dev/nbd#\x00', 0x0, 0x300) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:19 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="3e0c5bf3812d8eab72ebd7df5532b028a7c3e1bf04fa4147c1dfec4cc4af745e9df4086b8bf79dd7cde79cdb5b727d4054bdc3ce431f12f1449e0b02120de70ade20d149e61b3652b84522f20eed1de23247d7569c4f7091d9fdf2310ae60d5f812bf2652a7e0b0f1bb3b4fa544e6a9ead0d57172303b3edc1f9398066e1e289ee9a474e3c088cc4c1bf7c2dc01244c62659ed02d7d4ba3656747395c83486119b016707530ea8563eb62f59c458a66fb81f94", 0xb3, 0x0) keyctl$get_keyring_id(0x0, r0, 0x1) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x4002) 08:52:19 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 152.420486][T10716] Invalid argument reading file caps for ./file0 [ 152.428722][T10713] FAULT_INJECTION: forcing a failure. [ 152.428722][T10713] name failslab, interval 1, probability 0, space 0, times 0 [ 152.455734][T10721] Invalid argument reading file caps for ./file0 [ 152.462196][T10713] CPU: 0 PID: 10713 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 152.469747][T10713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.479887][T10713] Call Trace: [ 152.483193][T10713] dump_stack+0x172/0x1f0 [ 152.487546][T10713] should_fail.cold+0xa/0x15 [ 152.492156][T10713] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 152.497975][T10713] ? ___might_sleep+0x163/0x280 [ 152.502845][T10713] __should_failslab+0x121/0x190 [ 152.502863][T10713] should_failslab+0x9/0x14 [ 152.502884][T10713] kmem_cache_alloc+0x2b2/0x6f0 [ 152.517630][T10713] ? nr_iowait+0x130/0x130 [ 152.517646][T10713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 152.517666][T10713] mm_alloc+0x1d/0xd0 [ 152.532258][T10713] __do_execve_file.isra.0+0xaa3/0x23a0 [ 152.537805][T10713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 152.544056][T10713] ? copy_strings_kernel+0x110/0x110 [ 152.544071][T10713] ? strncpy_from_user+0x2ac/0x380 [ 152.544091][T10713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 152.544110][T10713] __ia32_compat_sys_execveat+0xf3/0x140 08:52:19 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x80fe}}, 0x1c) 08:52:19 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) creat(&(0x7f0000000100)='./file0\x00', 0x80000000001002) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000140)={0x71, 0x3, "402b6574c9085932e0e6b5003fa18fd8d40a3933e1bcbf29f3ff50f1bd675496681e24a1ad14874a4264b4b408bddb7e0a11b762d875d1074524ecc73bee82080aa5b0e3c6d5c648b244a72410f67c4ce2907c43ec9061aaae34c9222c5a7f9be9a50a28666b7326a3"}, 0x90000) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xffffffff, 0x220040) [ 152.544139][T10713] do_fast_syscall_32+0x281/0xd54 [ 152.544167][T10713] entry_SYSENTER_compat+0x70/0x7f [ 152.566368][T10713] RIP: 0023:0xf7f65849 [ 152.566385][T10713] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 152.566393][T10713] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 152.566406][T10713] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 08:52:19 executing program 1 (fault-call:3 fault-nth:13): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:19 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0/bus\x00', 0xfffffffffffffffd, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 152.566413][T10713] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 152.566421][T10713] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 152.566429][T10713] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 152.566436][T10713] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:19 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) accept4(r0, 0x0, &(0x7f0000000000), 0x80000) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000040)) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0xfffffffffffffe99, 0x0) r1 = semget$private(0x0, 0x0, 0x10c) semctl$IPC_RMID(r1, 0x0, 0x0) [ 152.682808][T10735] FAULT_INJECTION: forcing a failure. [ 152.682808][T10735] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.732108][T10735] CPU: 1 PID: 10735 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 152.739697][T10735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.749763][T10735] Call Trace: [ 152.753061][T10735] dump_stack+0x172/0x1f0 [ 152.757406][T10735] should_fail.cold+0xa/0x15 [ 152.762008][T10735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 152.767832][T10735] ? ___might_sleep+0x163/0x280 [ 152.772708][T10735] should_fail_alloc_page+0x50/0x60 [ 152.777922][T10735] __alloc_pages_nodemask+0x1a1/0x8d0 [ 152.783303][T10735] ? mark_held_locks+0xf0/0xf0 [ 152.788076][T10735] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 152.793818][T10735] ? find_held_lock+0x35/0x130 [ 152.798585][T10735] ? percpu_ref_put_many+0x94/0x190 [ 152.803784][T10735] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 152.810037][T10735] alloc_pages_current+0x107/0x210 [ 152.815156][T10735] __get_free_pages+0xc/0x40 [ 152.819754][T10735] pgd_alloc+0x8b/0x3f0 [ 152.823916][T10735] ? pgd_page_get_mm+0x40/0x40 [ 152.828687][T10735] ? lockdep_init_map+0x1be/0x6d0 [ 152.833716][T10735] ? lockdep_init_map+0x1be/0x6d0 [ 152.838751][T10735] mm_init+0x590/0x9b0 [ 152.842820][T10735] mm_alloc+0xa6/0xd0 [ 152.846795][T10735] __do_execve_file.isra.0+0xaa3/0x23a0 [ 152.852328][T10735] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 152.858563][T10735] ? copy_strings_kernel+0x110/0x110 [ 152.863831][T10735] ? strncpy_from_user+0x2ac/0x380 [ 152.868932][T10735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 152.875154][T10735] __ia32_compat_sys_execveat+0xf3/0x140 [ 152.880771][T10735] do_fast_syscall_32+0x281/0xd54 [ 152.885785][T10735] entry_SYSENTER_compat+0x70/0x7f [ 152.890883][T10735] RIP: 0023:0xf7f65849 [ 152.894934][T10735] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 152.914518][T10735] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 152.922908][T10735] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 08:52:19 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:19 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000080)=""/95) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xc0fe}}, 0x1c) 08:52:19 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:19 executing program 5: io_setup(0x9, &(0x7f0000000000)=0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) io_getevents(r0, 0x4, 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)={r1, r2+30000000}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 152.930862][T10735] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 152.938813][T10735] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 152.946766][T10735] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 152.954717][T10735] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:19 executing program 4 (fault-call:1 fault-nth:0): clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:19 executing program 1 (fault-call:3 fault-nth:14): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:19 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 153.068694][T10766] Invalid argument reading file caps for ./file0 08:52:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfc00}}, 0x1c) [ 153.123458][T10771] FAULT_INJECTION: forcing a failure. [ 153.123458][T10771] name failslab, interval 1, probability 0, space 0, times 0 [ 153.150585][T10772] FAULT_INJECTION: forcing a failure. [ 153.150585][T10772] name failslab, interval 1, probability 0, space 0, times 0 [ 153.164240][T10771] CPU: 0 PID: 10771 Comm: syz-executor.1 Not tainted 5.1.0+ #5 08:52:19 executing program 2: personality(0x1bb2baf3005ac137) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x20000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x4, 0x9, 0x6, 0x4, 0x5, 0x619, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e24, 0x3, @ipv4={[], [], @broadcast}, 0x2}}, 0x1ff, 0x7}, &(0x7f0000000200)=0x88) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={r1, 0xa2c1, 0x101, 0x3, 0x7, 0xffffffff, 0x2, 0x12a, {r2, @in={{0x2, 0x4e21, @empty}}, 0x1, 0x7, 0x6, 0xe6, 0x401}}, &(0x7f0000000300)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e20, 0xffff, @remote, 0x80}}, 0xa00, 0x80}, &(0x7f0000000400)=0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) 08:52:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfe80}}, 0x1c) [ 153.171799][T10771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.181856][T10771] Call Trace: [ 153.185160][T10771] dump_stack+0x172/0x1f0 [ 153.189509][T10771] should_fail.cold+0xa/0x15 [ 153.194126][T10771] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 153.199948][T10771] ? ___might_sleep+0x163/0x280 [ 153.204814][T10771] __should_failslab+0x121/0x190 [ 153.209763][T10771] should_failslab+0x9/0x14 [ 153.214363][T10771] kmem_cache_alloc+0x2b2/0x6f0 [ 153.219230][T10771] vm_area_alloc+0x20/0x110 [ 153.223739][T10771] __do_execve_file.isra.0+0xc34/0x23a0 [ 153.229283][T10771] ? copy_strings_kernel+0x110/0x110 [ 153.229299][T10771] ? strncpy_from_user+0x2ac/0x380 [ 153.229318][T10771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 153.229338][T10771] __ia32_compat_sys_execveat+0xf3/0x140 [ 153.229359][T10771] do_fast_syscall_32+0x281/0xd54 [ 153.229380][T10771] entry_SYSENTER_compat+0x70/0x7f [ 153.229396][T10771] RIP: 0023:0xf7f65849 [ 153.265757][T10771] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 153.285359][T10771] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 153.293759][T10771] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 153.301716][T10771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 153.309670][T10771] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 08:52:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfec0}}, 0x1c) [ 153.317625][T10771] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 153.325575][T10771] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:20 executing program 2: personality(0x7bdc0ee0e1ffc863) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x0, r1}) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) 08:52:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xff00}}, 0x1c) [ 153.384257][T10772] CPU: 0 PID: 10772 Comm: syz-executor.4 Not tainted 5.1.0+ #5 [ 153.391848][T10772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.401893][T10772] Call Trace: [ 153.401915][T10772] dump_stack+0x172/0x1f0 [ 153.401935][T10772] should_fail.cold+0xa/0x15 [ 153.401953][T10772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 153.401975][T10772] ? ___might_sleep+0x163/0x280 [ 153.401997][T10772] __should_failslab+0x121/0x190 [ 153.429748][T10772] should_failslab+0x9/0x14 08:52:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x2000000}}, 0x1c) [ 153.434259][T10772] kmem_cache_alloc_trace+0x2d1/0x760 [ 153.439658][T10772] ? lock_downgrade+0x880/0x880 [ 153.444520][T10772] perf_event_alloc.part.0+0xbf/0x3230 [ 153.449983][T10772] ? kasan_check_read+0x11/0x20 [ 153.454845][T10772] ? do_raw_spin_unlock+0x57/0x270 [ 153.459966][T10772] ? _raw_spin_unlock+0x2d/0x50 [ 153.464827][T10772] ? __perf_event_read+0xe10/0xe10 [ 153.469951][T10772] __do_sys_perf_event_open+0x830/0x24e0 [ 153.475603][T10772] ? perf_event_set_output+0x4e0/0x4e0 [ 153.481080][T10772] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 153.487333][T10772] ? __ia32_sys_read+0xb0/0xb0 [ 153.487351][T10772] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 153.487366][T10772] ? do_fast_syscall_32+0xd1/0xd54 [ 153.487382][T10772] ? entry_SYSENTER_compat+0x70/0x7f [ 153.487397][T10772] ? do_fast_syscall_32+0xd1/0xd54 [ 153.487417][T10772] __ia32_sys_perf_event_open+0xbd/0x140 [ 153.497607][T10772] do_fast_syscall_32+0x281/0xd54 [ 153.497629][T10772] entry_SYSENTER_compat+0x70/0x7f [ 153.497641][T10772] RIP: 0023:0xf7f31849 [ 153.497655][T10772] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 153.497662][T10772] RSP: 002b:00000000f5d2d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000150 [ 153.497676][T10772] RAX: ffffffffffffffda RBX: 00000000200002c0 RCX: 00000000ffffffff [ 153.497685][T10772] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000000 [ 153.497691][T10772] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 153.497699][T10772] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 153.497712][T10772] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 153.860585][T10766] Invalid argument reading file caps for ./file0 08:52:20 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x20000, 0xc0) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfc000000}}, 0x1c) 08:52:20 executing program 2: personality(0x1bb2baf3005ac137) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000080)={{0x3, @addr=0x8}, 0x8, 0x29fe, 0x7}) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) 08:52:20 executing program 4 (fault-call:1 fault-nth:1): clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:20 executing program 1 (fault-call:3 fault-nth:15): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:20 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:20 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x2b6, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fcntl$getflags(r0, 0x1) 08:52:20 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfe800000}}, 0x1c) [ 153.979567][T10816] FAULT_INJECTION: forcing a failure. [ 153.979567][T10816] name failslab, interval 1, probability 0, space 0, times 0 [ 154.004422][T10817] FAULT_INJECTION: forcing a failure. [ 154.004422][T10817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.063769][T10817] CPU: 0 PID: 10817 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 154.071368][T10817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.081438][T10817] Call Trace: [ 154.084741][T10817] dump_stack+0x172/0x1f0 [ 154.089085][T10817] should_fail.cold+0xa/0x15 [ 154.093689][T10817] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 154.099504][T10817] ? ___might_sleep+0x163/0x280 [ 154.104373][T10817] should_fail_alloc_page+0x50/0x60 [ 154.109578][T10817] __alloc_pages_nodemask+0x1a1/0x8d0 [ 154.114953][T10817] ? current_time+0x6b/0x140 [ 154.119546][T10817] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 154.125269][T10817] ? __lock_acquire+0x54f/0x5490 [ 154.130210][T10817] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 154.136460][T10817] alloc_pages_current+0x107/0x210 [ 154.141576][T10817] get_zeroed_page+0x14/0x50 [ 154.146174][T10817] __pud_alloc+0x3b/0x250 [ 154.150506][T10817] __handle_mm_fault+0x7a5/0x3ec0 [ 154.155542][T10817] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 154.161102][T10817] ? find_held_lock+0x35/0x130 [ 154.161119][T10817] ? handle_mm_fault+0x322/0xb30 [ 154.161142][T10817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.177036][T10817] ? kasan_check_read+0x11/0x20 [ 154.177056][T10817] handle_mm_fault+0x43f/0xb30 [ 154.177076][T10817] __get_user_pages+0x7b6/0x1a40 [ 154.177100][T10817] ? follow_page_mask+0x19a0/0x19a0 [ 154.186675][T10817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.186703][T10817] get_user_pages_remote+0x21d/0x440 [ 154.186731][T10817] copy_strings.isra.0+0x3dc/0x890 [ 154.186754][T10817] ? remove_arg_zero+0x590/0x590 [ 154.186773][T10817] ? prepare_binprm+0x6aa/0x940 [ 154.203083][T10817] ? vma_link+0x117/0x180 [ 154.203101][T10817] ? install_exec_creds+0x180/0x180 [ 154.203121][T10817] copy_strings_kernel+0xa5/0x110 [ 154.203141][T10817] __do_execve_file.isra.0+0x10ef/0x23a0 [ 154.203164][T10817] ? copy_strings_kernel+0x110/0x110 [ 154.248653][T10817] ? strncpy_from_user+0x2ac/0x380 [ 154.253765][T10817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 154.260008][T10817] __ia32_compat_sys_execveat+0xf3/0x140 [ 154.265644][T10817] do_fast_syscall_32+0x281/0xd54 [ 154.270670][T10817] entry_SYSENTER_compat+0x70/0x7f [ 154.275774][T10817] RIP: 0023:0xf7f65849 [ 154.279836][T10817] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 154.299429][T10817] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 08:52:21 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfec00000}}, 0x1c) 08:52:21 executing program 2: personality(0x1bb2baf3005ac137) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x80000000, 0x200000) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000180)={0xc021, 0x2}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = semget$private(0x0, 0x7, 0x80) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0xce001, 0x0) semctl$IPC_INFO(r2, 0x4, 0x3, &(0x7f0000000040)=""/18) r3 = open$dir(&(0x7f0000000100)='./file0/bus\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/bus\x00', 0x4) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000000c0)) [ 154.307833][T10817] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 154.315795][T10817] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 154.323756][T10817] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 154.331719][T10817] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 154.341165][T10817] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 154.349153][T10816] CPU: 1 PID: 10816 Comm: syz-executor.4 Not tainted 5.1.0+ #5 [ 154.356713][T10816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.366762][T10816] Call Trace: [ 154.370059][T10816] dump_stack+0x172/0x1f0 [ 154.374396][T10816] should_fail.cold+0xa/0x15 [ 154.379007][T10816] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 154.384833][T10816] ? ___might_sleep+0x163/0x280 [ 154.389699][T10816] __should_failslab+0x121/0x190 [ 154.394647][T10816] ? perf_trace_xfs_imap_class+0x730/0x730 [ 154.400454][T10816] should_failslab+0x9/0x14 [ 154.404960][T10816] kmem_cache_alloc_trace+0x2d1/0x760 08:52:21 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xff000000}}, 0x1c) [ 154.410351][T10816] ? perf_trace_xfs_imap_class+0x730/0x730 [ 154.416166][T10816] tracepoint_probe_register_prio+0x54f/0x7b0 [ 154.422240][T10816] ? pcpu_balance_workfn+0x12a0/0x12a0 [ 154.427708][T10816] ? perf_trace_xfs_imap_class+0x730/0x730 [ 154.433516][T10816] ? perf_trace_xfs_imap_class+0x730/0x730 [ 154.439317][T10816] tracepoint_probe_register+0x2b/0x40 [ 154.439361][T10816] trace_event_reg+0x299/0x350 [ 154.449649][T10816] perf_trace_event_init+0x500/0x990 [ 154.455055][T10816] perf_trace_init+0x189/0x250 [ 154.459826][T10816] perf_tp_event_init+0xa6/0x120 08:52:21 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) getsockopt(r0, 0x3, 0x6, &(0x7f0000000080)=""/11, &(0x7f00000000c0)=0xb) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000140)={r2, 0x18}) 08:52:21 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x200000000000000}}, 0x1c) [ 154.464769][T10816] perf_try_init_event+0x137/0x3f0 [ 154.469892][T10816] perf_event_alloc.part.0+0xfd3/0x3230 [ 154.475482][T10816] ? kasan_check_read+0x11/0x20 [ 154.480344][T10816] ? __perf_event_read+0xe10/0xe10 [ 154.485475][T10816] __do_sys_perf_event_open+0x830/0x24e0 [ 154.491122][T10816] ? perf_event_set_output+0x4e0/0x4e0 [ 154.496584][T10816] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 154.502842][T10816] ? __ia32_sys_read+0xb0/0xb0 [ 154.508071][T10816] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 154.513537][T10816] ? do_fast_syscall_32+0xd1/0xd54 [ 154.518643][T10816] ? entry_SYSENTER_compat+0x70/0x7f [ 154.523929][T10816] ? do_fast_syscall_32+0xd1/0xd54 [ 154.529056][T10816] __ia32_sys_perf_event_open+0xbd/0x140 [ 154.534702][T10816] do_fast_syscall_32+0x281/0xd54 [ 154.539736][T10816] entry_SYSENTER_compat+0x70/0x7f [ 154.544865][T10816] RIP: 0023:0xf7f31849 08:52:21 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0/bus\x00', 0xc, 0x3) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:52:21 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfc00000000000000}}, 0x1c) [ 154.548941][T10816] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 154.568557][T10816] RSP: 002b:00000000f5d2d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000150 [ 154.576982][T10816] RAX: ffffffffffffffda RBX: 00000000200002c0 RCX: 00000000ffffffff [ 154.584959][T10816] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000000 [ 154.592947][T10816] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 154.600928][T10816] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 154.600937][T10816] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:21 executing program 4 (fault-call:1 fault-nth:2): clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:21 executing program 1 (fault-call:3 fault-nth:16): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:21 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1, 0x5f, &(0x7f0000000000)="fa13fbb708bb58ec05d08f0714328d72a79565162089e4e980c375d20ea5cb23dbdaf96fc39bc3fb1c48fcce3d877194030e2307d41979a363069bee352326264292148ac6eeb5501726bc5298926965ddd074fbd439011259fc3eadc7f685"}) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:21 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:21 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x2040000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:21 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x9, 0x20000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x7ff, 0x819b}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r1, 0x9}, 0x8) personality(0x570000f) connect$pppoe(r0, &(0x7f00000002c0)={0x18, 0x0, {0x2, @empty, 'veth1\x00'}}, 0x1e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0/bus\x00', 0xc, 0x2) ustat(0x8001, &(0x7f0000000280)) open$dir(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7, 0x60010, r0, 0x0) ioctl$VIDIOC_QUERYBUF(r2, 0xc0445609, &(0x7f0000000040)={0xffffffff, 0xb, 0x4, 0x80000, {}, {0x2, 0x0, 0x1, 0x1, 0x2, 0xffff, "aa00a842"}, 0x1, 0x1, @userptr=0x7f, 0x4}) 08:52:21 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt(r0, 0xfffffffffffffff9, 0xffffffffffffff01, &(0x7f0000000040)="19dadcef9da21432cdb15f9ed158d3d4fd770d529989a6983fe76cf3a6da6670b72c17e507e0ae7147f809cf7de7f658b61d", 0x32) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000380)={0xb88, 0x4, 0x2, 0x0, 0x8, [{0xffffffffffff398b, 0x9, 0x1a000000000, 0x0, 0x0, 0x2081}, {0x7c, 0x7, 0x9, 0x0, 0x0, 0x2188}, {0x5, 0x9, 0x800}, {0x800, 0x4, 0x8001, 0x0, 0x0, 0x4}, {0xfffffffffffff255, 0x8, 0x4, 0x0, 0x0, 0x282}, {0xfe1, 0x0, 0x0, 0x0, 0x0, 0x802}, {0x0, 0x66108a57, 0x1, 0x0, 0x0, 0x80}, {0x6, 0x4, 0x3, 0x0, 0x0, 0xa00}]}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x6, 0x8000, 0x7, 0x0, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in={{0x2, 0x4e21, @loopback}}, [0x3, 0xb8, 0x1, 0x2, 0x8, 0x9, 0x9, 0x7, 0xfff, 0xcf, 0x2, 0x1, 0x80000000, 0x4, 0x200]}, &(0x7f0000000140)=0x100) ioctl$PPPIOCGIDLE(r0, 0x8008743f, &(0x7f00000001c0)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x80) [ 154.696337][T10858] Invalid argument reading file caps for ./file0 [ 154.723119][T10859] FAULT_INJECTION: forcing a failure. [ 154.723119][T10859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.774291][T10861] FAULT_INJECTION: forcing a failure. [ 154.774291][T10861] name failslab, interval 1, probability 0, space 0, times 0 [ 154.787165][T10861] CPU: 1 PID: 10861 Comm: syz-executor.4 Not tainted 5.1.0+ #5 [ 154.794710][T10861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.799627][T10873] cgroup: fork rejected by pids controller in /syz3 [ 154.804763][T10861] Call Trace: [ 154.804807][T10861] dump_stack+0x172/0x1f0 [ 154.804828][T10861] should_fail.cold+0xa/0x15 [ 154.804843][T10861] ? lockdep_hardirqs_on+0x418/0x5d0 [ 154.804866][T10861] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 154.834860][T10861] ? __sigqueue_alloc+0x173/0x4d0 [ 154.839890][T10861] ? find_held_lock+0x35/0x130 [ 154.844663][T10861] __should_failslab+0x121/0x190 [ 154.849605][T10861] should_failslab+0x9/0x14 [ 154.854105][T10861] kmem_cache_alloc+0x47/0x6f0 [ 154.858866][T10861] ? kasan_check_read+0x11/0x20 [ 154.863729][T10861] __sigqueue_alloc+0x268/0x4d0 [ 154.868576][T10861] __send_signal+0xda3/0x1590 [ 154.873253][T10861] send_signal+0x49/0xd0 [ 154.877579][T10861] force_sig_info+0x251/0x310 [ 154.882258][T10861] force_sig_fault+0xbb/0xf0 [ 154.886848][T10861] ? force_sigsegv+0x120/0x120 [ 154.891607][T10861] ? bad_area_access_error+0x284/0x390 [ 154.897073][T10861] ? trace_hardirqs_on+0x67/0x230 [ 154.902099][T10861] __bad_area_nosemaphore+0x332/0x420 [ 154.907477][T10861] bad_area_access_error+0x29a/0x390 [ 154.912758][T10861] ? find_vma+0x30/0x170 [ 154.916999][T10861] __do_page_fault+0x3f6/0xda0 [ 154.921767][T10861] do_page_fault+0x71/0x581 [ 154.926265][T10861] ? page_fault+0x8/0x30 [ 154.930504][T10861] page_fault+0x1e/0x30 [ 154.934650][T10861] RIP: 0023:0xf5d2d168 [ 154.938714][T10861] Code: 14 08 60 af 14 08 6c af 14 08 28 d2 d2 f5 00 fc 7c 63 f0 00 00 00 6c af 14 08 81 00 00 00 68 af 14 08 60 af 14 08 6c af 14 08 <28> d2 d2 f5 0e ca 04 08 00 00 00 00 00 00 00 00 00 0f 3d 00 40 48 [ 154.958305][T10861] RSP: 002b:00000000f5d2d0dc EFLAGS: 00010296 [ 154.964379][T10861] RAX: fffffffffffffff3 RBX: 00000000200002c0 RCX: 00000000f5d2d13c [ 154.972347][T10861] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000000 [ 154.980310][T10861] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 154.988275][T10861] R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 [ 154.996238][T10861] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 155.004229][T10859] CPU: 0 PID: 10859 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 155.011788][T10859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.021851][T10859] Call Trace: [ 155.025154][T10859] dump_stack+0x172/0x1f0 [ 155.029496][T10859] should_fail.cold+0xa/0x15 [ 155.034105][T10859] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 155.039922][T10859] ? ___might_sleep+0x163/0x280 [ 155.044796][T10859] should_fail_alloc_page+0x50/0x60 [ 155.050000][T10859] __alloc_pages_nodemask+0x1a1/0x8d0 [ 155.055383][T10859] ? __pud_alloc+0x1d3/0x250 [ 155.059984][T10859] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 155.065705][T10859] ? __pud_alloc+0x1d3/0x250 [ 155.070291][T10859] ? lock_downgrade+0x880/0x880 [ 155.075130][T10859] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 155.081355][T10859] alloc_pages_current+0x107/0x210 [ 155.086454][T10859] __pmd_alloc+0x41/0x460 [ 155.090763][T10859] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 155.096983][T10859] __handle_mm_fault+0x192a/0x3ec0 [ 155.102078][T10859] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 155.107605][T10859] ? find_held_lock+0x35/0x130 [ 155.112351][T10859] ? handle_mm_fault+0x322/0xb30 [ 155.117277][T10859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.123500][T10859] ? kasan_check_read+0x11/0x20 [ 155.128338][T10859] handle_mm_fault+0x43f/0xb30 [ 155.133089][T10859] __get_user_pages+0x7b6/0x1a40 [ 155.138017][T10859] ? follow_page_mask+0x19a0/0x19a0 [ 155.143197][T10859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.149429][T10859] get_user_pages_remote+0x21d/0x440 [ 155.154719][T10859] copy_strings.isra.0+0x3dc/0x890 [ 155.159818][T10859] ? remove_arg_zero+0x590/0x590 [ 155.164739][T10859] ? prepare_binprm+0x6aa/0x940 [ 155.169571][T10859] ? vma_link+0x117/0x180 [ 155.173889][T10859] ? install_exec_creds+0x180/0x180 [ 155.179081][T10859] copy_strings_kernel+0xa5/0x110 [ 155.184094][T10859] __do_execve_file.isra.0+0x10ef/0x23a0 [ 155.189716][T10859] ? copy_strings_kernel+0x110/0x110 [ 155.194988][T10859] ? strncpy_from_user+0x2ac/0x380 [ 155.200091][T10859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.206319][T10859] __ia32_compat_sys_execveat+0xf3/0x140 [ 155.211941][T10859] do_fast_syscall_32+0x281/0xd54 [ 155.216954][T10859] entry_SYSENTER_compat+0x70/0x7f [ 155.222044][T10859] RIP: 0023:0xf7f65849 [ 155.226116][T10859] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 155.245699][T10859] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 155.254096][T10859] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 155.262046][T10859] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 08:52:21 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:21 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfe80000000000000}}, 0x1c) 08:52:21 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000005, 0x4000000004000011, r1, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000080)=0x2, 0x4) 08:52:21 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 155.269999][T10859] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 155.277950][T10859] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 155.285903][T10859] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 155.315359][T10882] Invalid argument reading file caps for ./file0 08:52:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xfec0000000000000}}, 0x1c) 08:52:22 executing program 4: clone(0x20008004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040)) [ 155.352727][T10882] Invalid argument reading file caps for ./file0 08:52:22 executing program 1 (fault-call:3 fault-nth:17): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:22 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:22 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) accept4$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e, 0x80000) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x6, 0x810, r0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) r2 = accept4$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14, 0x80000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x101}, 0x0, 0x0, &(0x7f00000002c0)={0x8e00, 0xe4, 0x3, 0x3d13}, &(0x7f0000000300)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x8059}}, 0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200)={0x7, 0x4, 0x7}, 0xc) ioctl$int_in(r1, 0x5473, &(0x7f0000000480)=0xffffffffffffffaf) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', r3}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000600)=0xe8) 08:52:22 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) move_pages(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000ffc000/0x4000)=nil], &(0x7f00000000c0)=[0x8001, 0x3f, 0x1, 0x9, 0x40, 0x10001, 0x4], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) 08:52:22 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:22 executing program 2: personality(0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:52:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0xff00000000000000}}, 0x1c) [ 155.536148][T10914] Invalid argument reading file caps for ./file0 08:52:22 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:22 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x1a79, 0x10420000) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660ff32f66b83f1a89210f23d80f21f86635c00000b00f23f80fde340f20e06635000020000f22e036260f08bad104b0a9ee0f01cb440f20c0663502000000440f22c00507000f01c8", 0x49}], 0x1, 0x40, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000100)) [ 155.611021][T10920] Invalid argument reading file caps for ./file0 08:52:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x2}}, 0x1c) [ 155.680521][T10932] FAULT_INJECTION: forcing a failure. [ 155.680521][T10932] name failslab, interval 1, probability 0, space 0, times 0 08:52:22 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 155.734371][T10932] CPU: 1 PID: 10932 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 155.741959][T10932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.752029][T10932] Call Trace: [ 155.755340][T10932] dump_stack+0x172/0x1f0 [ 155.759692][T10932] should_fail.cold+0xa/0x15 [ 155.764300][T10932] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 155.770131][T10932] ? ___might_sleep+0x163/0x280 [ 155.775007][T10932] __should_failslab+0x121/0x190 [ 155.779964][T10932] should_failslab+0x9/0x14 08:52:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x3}}, 0x1c) [ 155.784486][T10932] kmem_cache_alloc+0x2b2/0x6f0 [ 155.789353][T10932] ? alloc_pages_current+0x10f/0x210 [ 155.794655][T10932] __pmd_alloc+0xc9/0x460 [ 155.798992][T10932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 155.805247][T10932] __handle_mm_fault+0x192a/0x3ec0 [ 155.810375][T10932] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 155.815929][T10932] ? find_held_lock+0x35/0x130 [ 155.820696][T10932] ? handle_mm_fault+0x322/0xb30 [ 155.825648][T10932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.831899][T10932] ? kasan_check_read+0x11/0x20 [ 155.836758][T10932] handle_mm_fault+0x43f/0xb30 [ 155.841542][T10932] __get_user_pages+0x7b6/0x1a40 [ 155.846507][T10932] ? follow_page_mask+0x19a0/0x19a0 [ 155.851714][T10932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.857972][T10932] get_user_pages_remote+0x21d/0x440 [ 155.863273][T10932] copy_strings.isra.0+0x3dc/0x890 [ 155.868490][T10932] ? remove_arg_zero+0x590/0x590 [ 155.873433][T10932] ? prepare_binprm+0x6aa/0x940 [ 155.878280][T10932] ? vma_link+0x117/0x180 [ 155.882611][T10932] ? install_exec_creds+0x180/0x180 [ 155.887815][T10932] copy_strings_kernel+0xa5/0x110 [ 155.887835][T10932] __do_execve_file.isra.0+0x10ef/0x23a0 [ 155.887864][T10932] ? copy_strings_kernel+0x110/0x110 [ 155.887884][T10932] ? strncpy_from_user+0x2ac/0x380 [ 155.898512][T10932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 155.898530][T10932] __ia32_compat_sys_execveat+0xf3/0x140 [ 155.898552][T10932] do_fast_syscall_32+0x281/0xd54 [ 155.898573][T10932] entry_SYSENTER_compat+0x70/0x7f [ 155.898589][T10932] RIP: 0023:0xf7f65849 [ 155.908951][T10932] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 155.908959][T10932] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 155.908973][T10932] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 155.908982][T10932] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 08:52:22 executing program 1 (fault-call:3 fault-nth:18): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x5}}, 0x1c) 08:52:22 executing program 5: prctl$PR_MCE_KILL_GET(0x22) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) 08:52:22 executing program 2: personality(0x1bb2baf3005ac137) r0 = msgget$private(0x0, 0x3) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000080)=""/11) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000000c0)=""/29) 08:52:22 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 155.908988][T10932] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 155.909001][T10932] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 155.920825][T10932] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:22 executing program 2: rmdir(&(0x7f0000000040)='./file0\x00') personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mkdirat(r0, &(0x7f0000000080)='./file0/bus\x00', 0x8) r1 = open$dir(&(0x7f0000000140)='./file0/bus\x00', 0xfffffffffffffffe, 0xd0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x3000004, 0x11, r1, 0x1) 08:52:22 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) pipe2(&(0x7f00000001c0), 0x4000) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4008641a, &(0x7f0000000140)={0xa, &(0x7f0000000100)=[0x9, 0x76eb, 0x8, 0xfffffffffffffffc, 0x7fffffff, 0x1, 0x6293, 0x80, 0x4, 0x2]}) 08:52:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x300}}, 0x1c) 08:52:22 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) recvmmsg(r0, &(0x7f0000001a80)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/110, 0x6e}, {&(0x7f0000000140)=""/113, 0x71}, {&(0x7f00000001c0)=""/52, 0x34}, {&(0x7f0000000200)=""/144, 0x90}], 0x4}, 0xfeb}, {{&(0x7f0000000380)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/196, 0xc4}, {&(0x7f0000000500)=""/230, 0xe6}], 0x2, &(0x7f0000000640)=""/163, 0xa3}, 0x6}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000700)=""/201, 0xc9}, {&(0x7f0000000800)=""/109, 0x6d}, {&(0x7f0000000880)=""/52, 0x34}, {&(0x7f00000008c0)=""/55, 0x37}, {&(0x7f0000000900)=""/69, 0x45}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/110, 0x6e}], 0x7, &(0x7f0000001a40)=""/31, 0x1f}, 0x80}], 0x3, 0x40000020, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x831, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0x4000000, 0xfffffff0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1e) [ 156.101566][T10967] FAULT_INJECTION: forcing a failure. [ 156.101566][T10967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.155114][T10975] Invalid argument reading file caps for ./file0 [ 156.195758][T10967] CPU: 1 PID: 10967 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 156.203339][T10967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.213397][T10967] Call Trace: [ 156.216694][T10967] dump_stack+0x172/0x1f0 [ 156.221036][T10967] should_fail.cold+0xa/0x15 [ 156.223013][T10986] Invalid argument reading file caps for ./file0 [ 156.225632][T10967] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 156.225652][T10967] ? ___might_sleep+0x163/0x280 [ 156.225682][T10967] should_fail_alloc_page+0x50/0x60 [ 156.247799][T10967] __alloc_pages_nodemask+0x1a1/0x8d0 [ 156.253164][T10967] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 156.258866][T10967] ? kasan_check_write+0x14/0x20 [ 156.263792][T10967] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 156.270015][T10967] alloc_pages_current+0x107/0x210 [ 156.275109][T10967] pte_alloc_one+0x1b/0x1a0 [ 156.279591][T10967] __pte_alloc+0x20/0x310 [ 156.283901][T10967] __handle_mm_fault+0x3391/0x3ec0 [ 156.288992][T10967] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 156.294516][T10967] ? find_held_lock+0x35/0x130 [ 156.299261][T10967] ? handle_mm_fault+0x322/0xb30 [ 156.304185][T10967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.310404][T10967] ? kasan_check_read+0x11/0x20 [ 156.315238][T10967] handle_mm_fault+0x43f/0xb30 [ 156.319988][T10967] __get_user_pages+0x7b6/0x1a40 [ 156.324912][T10967] ? follow_page_mask+0x19a0/0x19a0 [ 156.330090][T10967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.336331][T10967] get_user_pages_remote+0x21d/0x440 [ 156.342307][T10967] copy_strings.isra.0+0x3dc/0x890 [ 156.347403][T10967] ? remove_arg_zero+0x590/0x590 [ 156.352323][T10967] ? prepare_binprm+0x6aa/0x940 [ 156.357149][T10967] ? vma_link+0x117/0x180 [ 156.361457][T10967] ? install_exec_creds+0x180/0x180 [ 156.366635][T10967] copy_strings_kernel+0xa5/0x110 [ 156.371642][T10967] __do_execve_file.isra.0+0x10ef/0x23a0 [ 156.377259][T10967] ? copy_strings_kernel+0x110/0x110 [ 156.382537][T10967] ? strncpy_from_user+0x2ac/0x380 [ 156.387635][T10967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.393858][T10967] __ia32_compat_sys_execveat+0xf3/0x140 [ 156.399485][T10967] do_fast_syscall_32+0x281/0xd54 [ 156.404496][T10967] entry_SYSENTER_compat+0x70/0x7f [ 156.409609][T10967] RIP: 0023:0xf7f65849 [ 156.413657][T10967] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 156.433239][T10967] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 08:52:23 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair(0x10, 0x5, 0x7, &(0x7f0000000080)) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:52:23 executing program 5: setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x1, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000280)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}], [{@dont_measure='dont_measure'}, {@subj_role={'subj_role', 0x3d, 'security.capability\x00'}}]}}) 08:52:23 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x204000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 156.441629][T10967] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 156.449578][T10967] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 156.457529][T10967] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 156.465480][T10967] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 156.473432][T10967] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:23 executing program 1 (fault-call:3 fault-nth:19): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:23 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0x2}, 0x1c) 08:52:23 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000040)) 08:52:23 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfc}, 0x1c) 08:52:23 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 156.679647][T11001] FAULT_INJECTION: forcing a failure. [ 156.679647][T11001] name failslab, interval 1, probability 0, space 0, times 0 [ 156.744625][T11001] CPU: 1 PID: 11001 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 156.752201][T11001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.762253][T11001] Call Trace: [ 156.762278][T11001] dump_stack+0x172/0x1f0 [ 156.762300][T11001] should_fail.cold+0xa/0x15 [ 156.769892][T11001] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 156.769914][T11001] ? ___might_sleep+0x163/0x280 [ 156.785129][T11001] __should_failslab+0x121/0x190 [ 156.790072][T11001] should_failslab+0x9/0x14 [ 156.794583][T11001] kmem_cache_alloc+0x2b2/0x6f0 [ 156.799441][T11001] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 156.805694][T11001] ptlock_alloc+0x20/0x70 [ 156.810030][T11001] pte_alloc_one+0x6d/0x1a0 [ 156.810523][T11020] Invalid argument reading file caps for ./file0 [ 156.814536][T11001] __pte_alloc+0x20/0x310 [ 156.814555][T11001] __handle_mm_fault+0x3391/0x3ec0 [ 156.814575][T11001] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 156.814590][T11001] ? find_held_lock+0x35/0x130 [ 156.814602][T11001] ? handle_mm_fault+0x322/0xb30 [ 156.814625][T11001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.851772][T11001] ? kasan_check_read+0x11/0x20 [ 156.856652][T11001] handle_mm_fault+0x43f/0xb30 [ 156.861425][T11001] __get_user_pages+0x7b6/0x1a40 [ 156.861454][T11001] ? follow_page_mask+0x19a0/0x19a0 [ 156.861472][T11001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.861497][T11001] get_user_pages_remote+0x21d/0x440 [ 156.871601][T11001] copy_strings.isra.0+0x3dc/0x890 [ 156.888194][T11001] ? remove_arg_zero+0x590/0x590 [ 156.892053][T11024] Invalid argument reading file caps for ./file0 [ 156.893137][T11001] ? prepare_binprm+0x6aa/0x940 [ 156.893154][T11001] ? vma_link+0x117/0x180 [ 156.893171][T11001] ? install_exec_creds+0x180/0x180 [ 156.893191][T11001] copy_strings_kernel+0xa5/0x110 [ 156.893215][T11001] __do_execve_file.isra.0+0x10ef/0x23a0 [ 156.911786][T11025] Invalid argument reading file caps for ./file0 [ 156.912157][T11001] ? copy_strings_kernel+0x110/0x110 [ 156.912174][T11001] ? strncpy_from_user+0x2ac/0x380 08:52:23 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) sendto$unix(r0, &(0x7f0000000000)="04287bca32c4e57327a6783950160f5d9d4f869f5a753ea0454a1b1e5d49e51285bb918762feedbc81d9f7c225d0ad7f6d3d48cc0a9cdaac3228bd700121d25b244b669516632eaaad84b9aed8ad62f568782fddac8cc7cf5165a5e911c6f97bc48cd990234f6c334c514422109ba0a7416844dc6381cd3ccbf519afd25cbfebfc4a42438d6e4dea43782f095dc4a3823a16dee4c19bfa6346aec1b89293c43b37825e91d8ed079797f402", 0xab, 0x0, &(0x7f00000000c0)=@file={0x1, './file0/file0\x00'}, 0x6e) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 08:52:23 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) fadvise64(r0, 0x0, 0x40, 0x4) 08:52:23 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000080)='./file0\x00', 0x8) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:insmod_exec_t:s0\x00', 0x23, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) getxattr(&(0x7f0000000140)='./file0/bus\x00', &(0x7f0000000180)=@random={'security.', 'security.selinux\x00'}, &(0x7f00000001c0)=""/214, 0xd6) [ 156.912194][T11001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 156.912220][T11001] __ia32_compat_sys_execveat+0xf3/0x140 [ 156.944709][T11001] do_fast_syscall_32+0x281/0xd54 [ 156.944732][T11001] entry_SYSENTER_compat+0x70/0x7f [ 156.944743][T11001] RIP: 0023:0xf7f65849 [ 156.944755][T11001] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 08:52:23 executing program 1 (fault-call:3 fault-nth:20): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:23 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 156.944768][T11001] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 156.956601][T11001] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 156.956610][T11001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 156.956618][T11001] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 156.956626][T11001] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 156.956634][T11001] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:23 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x4) execve(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 08:52:23 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0x80fe}, 0x1c) 08:52:23 executing program 4: clone(0x30000010, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000080)={{0x4, 0x5, 0xf3, 0x3, 'syz1\x00', 0x4}, 0x5, 0x10000000, 0x6, r1, 0x5, 0x5, 'syz0\x00', &(0x7f0000000040)=['cgroupwlan1\x00', 'wlan0\\wlan1+\x00', '\x00', '^user*wlan0eth0$\x00', '\x00'], 0x2c, [], [0x9, 0x7, 0x1, 0xfffffffffffffffd]}) [ 157.056638][T11034] Invalid argument reading file caps for ./file0 [ 157.065826][T11037] Invalid argument reading file caps for ./file0 08:52:23 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x80) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) [ 157.140113][T11042] FAULT_INJECTION: forcing a failure. [ 157.140113][T11042] name failslab, interval 1, probability 0, space 0, times 0 08:52:23 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 157.188296][T11042] CPU: 0 PID: 11042 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 157.195868][T11042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.195874][T11042] Call Trace: [ 157.195896][T11042] dump_stack+0x172/0x1f0 [ 157.195917][T11042] should_fail.cold+0xa/0x15 [ 157.195935][T11042] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 157.195958][T11042] ? ___might_sleep+0x163/0x280 [ 157.228809][T11042] __should_failslab+0x121/0x190 [ 157.233762][T11042] should_failslab+0x9/0x14 [ 157.238275][T11042] kmem_cache_alloc+0x2b2/0x6f0 [ 157.243128][T11042] ? __might_sleep+0x95/0x190 [ 157.243156][T11042] __anon_vma_prepare+0x62/0x3c0 [ 157.243176][T11042] ? __pte_alloc+0x1ba/0x310 [ 157.257341][T11042] __handle_mm_fault+0x34db/0x3ec0 [ 157.262458][T11042] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 157.262475][T11042] ? find_held_lock+0x35/0x130 [ 157.262490][T11042] ? handle_mm_fault+0x322/0xb30 [ 157.262514][T11042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 157.283947][T11042] ? kasan_check_read+0x11/0x20 08:52:24 executing program 2: personality(0x1bb2baf3005ac137) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x40, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000180)=""/117, &(0x7f0000000200)=0x75) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0/bus\x00', 0x5, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xc, 0x1e, r1, 0x1) [ 157.288812][T11042] handle_mm_fault+0x43f/0xb30 [ 157.293593][T11042] __get_user_pages+0x7b6/0x1a40 [ 157.298555][T11042] ? follow_page_mask+0x19a0/0x19a0 [ 157.303762][T11042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 157.310023][T11042] get_user_pages_remote+0x21d/0x440 [ 157.315327][T11042] copy_strings.isra.0+0x3dc/0x890 [ 157.320466][T11042] ? remove_arg_zero+0x590/0x590 [ 157.325406][T11042] ? prepare_binprm+0x6aa/0x940 [ 157.330258][T11042] ? vma_link+0x117/0x180 08:52:24 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) write$eventfd(r0, &(0x7f00000000c0)=0xdf7, 0x8) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8) creat(&(0x7f0000000100)='./file0/bus\x00', 0x20) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) [ 157.334591][T11042] ? install_exec_creds+0x180/0x180 [ 157.339792][T11042] copy_strings_kernel+0xa5/0x110 [ 157.344812][T11042] __do_execve_file.isra.0+0x10ef/0x23a0 [ 157.344837][T11042] ? copy_strings_kernel+0x110/0x110 [ 157.344851][T11042] ? strncpy_from_user+0x2ac/0x380 [ 157.344869][T11042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 157.344887][T11042] __ia32_compat_sys_execveat+0xf3/0x140 [ 157.372724][T11042] do_fast_syscall_32+0x281/0xd54 [ 157.377788][T11042] entry_SYSENTER_compat+0x70/0x7f [ 157.382902][T11042] RIP: 0023:0xf7f65849 08:52:24 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc010643a, &(0x7f0000000240)={0x0, 0x83, 0x1e}) personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) mount(&(0x7f0000000080)=@sg0='/dev/sg0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x1000000, &(0x7f0000000140)='\\em0-nodev%cgroup\x00') r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x11, 0x11, r2, 0x80000000000) symlinkat(&(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file0/bus\x00') [ 157.386971][T11042] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 157.410312][T11042] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 157.418746][T11042] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 157.426724][T11042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xc0fe}, 0x1c) 08:52:24 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0xffff, @empty, 0x3}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}], 0x2c) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 157.434801][T11042] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 157.442773][T11042] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 157.450745][T11042] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 157.487292][T11072] hugetlbfs: Unknown parameter '\em0-nodev%cgroup' [ 157.509011][T11075] Invalid argument reading file caps for ./file0 08:52:24 executing program 1 (fault-call:3 fault-nth:21): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfc00}, 0x1c) 08:52:24 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 157.537607][T11072] hugetlbfs: Unknown parameter '\em0-nodev%cgroup' 08:52:24 executing program 4: clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:24 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x820080}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2cb30000", @ANYRES16=r1, @ANYBLOB="00012bbd7000fedbdf25010000000000000008410000001000180000000769623a65716c0000"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r2 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x2, 0x48402) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x6000, 0x1) r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000280)=0x2) 08:52:24 executing program 5: setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x6}, {0x2a, 0xae2}], r1}, 0x18, 0x3) io_setup(0x6, &(0x7f0000000180)=0x0) r3 = dup(r0) r4 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0xd74, 0x240600) r5 = syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x7fff, 0x20000) io_submit(r2, 0x4, &(0x7f0000000700)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x200, r0, &(0x7f0000000280)="edd01905eb54ec7476b54485130d2705c3329751a648191f21e68156827d512fd539710ae89ec3c66801007e294a872d1fe61eed869bf620c942301510a9b38a633e08ccf706534b92da7e9f6417ecb31761876c890e8c82919bb36f1bd6eabbd0ef6a3c16ee26a349bb4a275ad7560f28edde98e73267819c07fadb2ed9613045f81d9d8fbaa5150d74e00fbf8d7ad8722d037b9dcb9bd54efafd849967652944a4daabaf92a982d41e75eeed2e75c18dbda1fc7b32c9e0bc206c20d4c7976f129098eaabe7c4126f00bdc9", 0xcc, 0x9, 0x0, 0x0, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xe, 0x4, r0, &(0x7f0000000380)="ade5602f87a0cdaf711276a7ca99354b419fcc81174cc6afc076f938141065002263b0f76eae8d942946af078b4c72f44fe4390c5456a345122f6f84e8c6c93cc7c5a939359b17b75f730b0dc6e269e50776099d0124f66b47e53980d3a155c6e34b945b5afc7558f7da6eb7b04ee8d0eae3f403ee292f0987b8fad2ef8b4afd3483fb8176f990cd9abc0ca1d57aabb378f4b591abaee248f41431de4d34fd64fcce753f9ff13bbf", 0xa8, 0x20, 0x0, 0x0, r4}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7, 0x8, r0, &(0x7f0000000480)="f8c714f11077b48d865f6ceb3e39cd9e840c6131443ab616cc2c08890bc0983d869254bb3869f98a51ced6cd9aeaa50a0ac847af12abf497da2ed5560ea514df11335617376e80b7ec477ad7062ae376d25930195619d660921478698d2230459a2cef077f9d0b51b75c3b8ee74c519f0155a5089ea030c6ac3901d94df8743555c9a359196da0dff53210056ea3ba5bb2383808d20f41fa", 0x98, 0x3a61, 0x0, 0x2, r5}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x3, 0x57c, r0, &(0x7f0000000640)="c7bb428b3dc95c0221c0d2796fdb24bb6f271f04304dc020709326dc7b0204dfecae07352b0432574419487464e2c959b08167d1d6ab7587e1bab57e1ec1599ee3c6f979db5728b26c29ff8557c34d13da445d6b3d493b4fa736803e373ab0339231ceaf9a43ed193bd79057dee7787f43985b578ca1863d92286c3218146ca2c644699f3dfe8bf8f86986372c4abe8cfe286358fa635f52f3f3eb2ef3", 0xffffff5e, 0x0, 0x0, 0x2, 0xffffffffffffff9c}]) [ 157.613329][T11084] FAULT_INJECTION: forcing a failure. [ 157.613329][T11084] name failslab, interval 1, probability 0, space 0, times 0 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfe80}, 0x1c) [ 157.724504][T11084] CPU: 0 PID: 11084 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 157.732105][T11084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.742172][T11084] Call Trace: [ 157.745477][T11084] dump_stack+0x172/0x1f0 [ 157.751306][T11084] should_fail.cold+0xa/0x15 [ 157.755909][T11084] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 157.761741][T11084] ? ___might_sleep+0x163/0x280 [ 157.761768][T11084] __should_failslab+0x121/0x190 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfec0}, 0x1c) [ 157.771546][T11084] should_failslab+0x9/0x14 [ 157.776066][T11084] kmem_cache_alloc+0x2b2/0x6f0 [ 157.780928][T11084] ? __might_sleep+0x95/0x190 [ 157.785616][T11084] __anon_vma_prepare+0x1b1/0x3c0 [ 157.790649][T11084] ? __pte_alloc+0x1ba/0x310 [ 157.795244][T11084] __handle_mm_fault+0x34db/0x3ec0 [ 157.800450][T11084] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 157.806000][T11084] ? find_held_lock+0x35/0x130 [ 157.810772][T11084] ? handle_mm_fault+0x322/0xb30 [ 157.815738][T11084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xff00}, 0x1c) 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0x2000000}, 0x1c) [ 157.821992][T11084] ? kasan_check_read+0x11/0x20 [ 157.826848][T11084] handle_mm_fault+0x43f/0xb30 [ 157.831622][T11084] __get_user_pages+0x7b6/0x1a40 [ 157.836577][T11084] ? follow_page_mask+0x19a0/0x19a0 [ 157.841787][T11084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 157.848049][T11084] get_user_pages_remote+0x21d/0x440 [ 157.853379][T11084] copy_strings.isra.0+0x3dc/0x890 [ 157.858505][T11084] ? remove_arg_zero+0x590/0x590 [ 157.863446][T11084] ? prepare_binprm+0x6aa/0x940 [ 157.868304][T11084] ? vma_link+0x117/0x180 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfc000000}, 0x1c) [ 157.872641][T11084] ? install_exec_creds+0x180/0x180 [ 157.877844][T11084] copy_strings_kernel+0xa5/0x110 [ 157.882890][T11084] __do_execve_file.isra.0+0x10ef/0x23a0 [ 157.888533][T11084] ? copy_strings_kernel+0x110/0x110 [ 157.893821][T11084] ? strncpy_from_user+0x2ac/0x380 [ 157.898936][T11084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 157.905172][T11084] __ia32_compat_sys_execveat+0xf3/0x140 [ 157.905194][T11084] do_fast_syscall_32+0x281/0xd54 [ 157.905215][T11084] entry_SYSENTER_compat+0x70/0x7f [ 157.905225][T11084] RIP: 0023:0xf7f65849 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfe800000}, 0x1c) [ 157.905241][T11084] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 157.905247][T11084] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 157.905265][T11084] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 157.961004][T11084] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 157.968980][T11084] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 157.976955][T11084] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 157.984927][T11084] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:24 executing program 1 (fault-call:3 fault-nth:22): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfec00000}, 0x1c) 08:52:24 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x81, 0x800) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e23, 0x0, @remote, 0x4}, {0xa, 0x4e20, 0x1ff, @local, 0x8}, 0x7, [0x1, 0x1, 0x200, 0x9, 0x0, 0x4eb3, 0x10001, 0x30]}, 0x5c) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x400) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) statfs(&(0x7f0000000080)='./file0/bus\x00', &(0x7f00000000c0)=""/240) 08:52:24 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:24 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 08:52:24 executing program 5: setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:24 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 158.108957][T11135] FAULT_INJECTION: forcing a failure. [ 158.108957][T11135] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:52:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xff000000}, 0x1c) 08:52:24 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0/bus\x00') ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4008641a, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[0x1, 0x100000000000000]}) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) [ 158.186262][T11138] cgroup: fork rejected by pids controller in /syz4 08:52:25 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x1, 0x8) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x2) fadvise64(r0, 0x0, 0xfffffffffffffff8, 0x1) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) [ 158.246291][T11135] CPU: 0 PID: 11135 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 158.253883][T11135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.263943][T11135] Call Trace: [ 158.267249][T11135] dump_stack+0x172/0x1f0 [ 158.271595][T11135] should_fail.cold+0xa/0x15 [ 158.276227][T11135] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 158.282041][T11135] ? ___might_sleep+0x163/0x280 [ 158.286915][T11135] should_fail_alloc_page+0x50/0x60 [ 158.292120][T11135] __alloc_pages_nodemask+0x1a1/0x8d0 [ 158.297501][T11135] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 158.303223][T11135] ? lock_downgrade+0x880/0x880 [ 158.308088][T11135] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 158.314342][T11135] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 158.320597][T11135] alloc_pages_vma+0xdd/0x540 [ 158.325286][T11135] __handle_mm_fault+0x1dd4/0x3ec0 [ 158.330406][T11135] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 158.336037][T11135] ? find_held_lock+0x35/0x130 08:52:25 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000080)=ANY=[@ANYBLOB="0600000024000000faffffffffff000000040000000800000100000083e70000ff070000ff0727c200000080"]) [ 158.342324][T11135] ? handle_mm_fault+0x322/0xb30 [ 158.347274][T11135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 158.353520][T11135] ? kasan_check_read+0x11/0x20 [ 158.358379][T11135] handle_mm_fault+0x43f/0xb30 [ 158.363156][T11135] __get_user_pages+0x7b6/0x1a40 [ 158.368106][T11135] ? follow_page_mask+0x19a0/0x19a0 [ 158.368125][T11135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 158.368151][T11135] get_user_pages_remote+0x21d/0x440 [ 158.368176][T11135] copy_strings.isra.0+0x3dc/0x890 [ 158.368199][T11135] ? remove_arg_zero+0x590/0x590 [ 158.379594][T11135] ? prepare_binprm+0x6aa/0x940 [ 158.379610][T11135] ? vma_link+0x117/0x180 [ 158.379625][T11135] ? install_exec_creds+0x180/0x180 [ 158.379645][T11135] copy_strings_kernel+0xa5/0x110 [ 158.379673][T11135] __do_execve_file.isra.0+0x10ef/0x23a0 [ 158.379698][T11135] ? copy_strings_kernel+0x110/0x110 [ 158.379714][T11135] ? strncpy_from_user+0x2ac/0x380 [ 158.379734][T11135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 158.379751][T11135] __ia32_compat_sys_execveat+0xf3/0x140 [ 158.379773][T11135] do_fast_syscall_32+0x281/0xd54 08:52:25 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x40c040, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000200)=0x6, 0x1) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000000)={0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x610, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x4040) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x9) [ 158.447245][T11135] entry_SYSENTER_compat+0x70/0x7f [ 158.452361][T11135] RIP: 0023:0xf7f65849 [ 158.456442][T11135] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 158.476055][T11135] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 158.476070][T11135] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 158.476078][T11135] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 158.476085][T11135] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 158.476093][T11135] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 158.476101][T11135] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:25 executing program 1 (fault-call:3 fault-nth:23): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:25 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) connect$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x1}}, 0x10) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0x200000000000000}, 0x1c) 08:52:25 executing program 4: clone(0x200c00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x1, 0x8000000000003, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0xa92b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) socket$vsock_dgram(0x28, 0x2, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7fffffff, 0x2000) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/171) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x9, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x10, 0x0, @udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)) 08:52:25 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:25 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0xfffffffffffffff1) ptrace$setsig(0x4203, r0, 0x1, &(0x7f0000000100)={0x1d, 0xfff, 0x8}) personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xaead, 0x800) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f00000001c0)={0x4, 0x81}) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) [ 158.596181][T11272] Invalid argument reading file caps for ./file0 08:52:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfc00000000000000}, 0x1c) 08:52:25 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{}, {r1, r2/1000+30000}}) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000000c0)="3f42106719c098ab1c8cc8dc9284dc4003905ff66bb39ccb5b9b304f59ee988b3e17f304594ef9318afe423e6ab807ed045b424b4c2cc8493468dc7208c529580637a61933ceeec2330ce939e4e410bb4195abbf638c01737b489120b09c45bebc37c13ada475ec5858a1669b7b6e83b", 0x70) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:25 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 158.682092][T11341] FAULT_INJECTION: forcing a failure. [ 158.682092][T11341] name failslab, interval 1, probability 0, space 0, times 0 08:52:25 executing program 4: clone(0x40400fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 158.774174][T11341] CPU: 0 PID: 11341 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 158.781768][T11341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.791823][T11341] Call Trace: [ 158.795127][T11341] dump_stack+0x172/0x1f0 [ 158.799469][T11341] should_fail.cold+0xa/0x15 [ 158.804073][T11341] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 158.809895][T11341] ? ___might_sleep+0x163/0x280 [ 158.814759][T11341] __should_failslab+0x121/0x190 [ 158.819701][T11341] should_failslab+0x9/0x14 08:52:25 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 158.824210][T11341] kmem_cache_alloc_trace+0x2d1/0x760 [ 158.829589][T11341] ? mark_held_locks+0xf0/0xf0 [ 158.834372][T11341] tomoyo_find_next_domain+0xe4/0x1f8a [ 158.839924][T11341] ? mark_held_locks+0xf0/0xf0 [ 158.844694][T11341] ? mark_held_locks+0xf0/0xf0 [ 158.849473][T11341] ? tomoyo_dump_page+0x510/0x510 [ 158.854500][T11341] ? lock_acquire+0x16f/0x3f0 [ 158.859177][T11341] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 158.864992][T11341] tomoyo_bprm_check_security+0x12a/0x1b0 [ 158.870740][T11341] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 158.876553][T11341] security_bprm_check+0x69/0xb0 [ 158.881500][T11341] search_binary_handler+0x77/0x570 [ 158.886701][T11341] ? kasan_check_read+0x11/0x20 [ 158.891565][T11341] __do_execve_file.isra.0+0x1394/0x23a0 [ 158.897213][T11341] ? copy_strings_kernel+0x110/0x110 [ 158.902510][T11341] ? strncpy_from_user+0x2ac/0x380 [ 158.907643][T11341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 158.913906][T11341] __ia32_compat_sys_execveat+0xf3/0x140 [ 158.919551][T11341] do_fast_syscall_32+0x281/0xd54 08:52:25 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x3) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 158.924586][T11341] entry_SYSENTER_compat+0x70/0x7f [ 158.929699][T11341] RIP: 0023:0xf7f65849 [ 158.933762][T11341] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 158.953359][T11341] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 158.961781][T11341] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 158.969753][T11341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 158.977721][T11341] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 158.977743][T11341] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 158.977751][T11341] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:25 executing program 1 (fault-call:3 fault-nth:24): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfe80000000000000}, 0x1c) 08:52:25 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x4, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xd, 0x11, r1, 0x800000000) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) 08:52:25 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:25 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x8000, 0x0) write$P9_RSTAT(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="860000007d020000007f0081b192a8b900000400000004000000000000000000014007000000feffffff030000000000000013002f640e7a2f62747266732d636f6e74726f6c0013002f6465762f62747266732d636f6e74726f6c0013002f6465762f62747266732d636f6e74726f6c0013002f64656f6e74726f6c00"], 0x86) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)=0x1) 08:52:25 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:25 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 159.170848][T11538] FAULT_INJECTION: forcing a failure. [ 159.170848][T11538] name failslab, interval 1, probability 0, space 0, times 0 [ 159.229765][T11538] CPU: 0 PID: 11538 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 159.237346][T11538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.247400][T11538] Call Trace: [ 159.250697][T11538] dump_stack+0x172/0x1f0 [ 159.255040][T11538] should_fail.cold+0xa/0x15 [ 159.259639][T11538] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 159.265462][T11538] ? ___might_sleep+0x163/0x280 [ 159.270329][T11538] __should_failslab+0x121/0x190 [ 159.275282][T11538] should_failslab+0x9/0x14 [ 159.279793][T11538] kmem_cache_alloc_trace+0x2d1/0x760 [ 159.285181][T11538] tomoyo_find_next_domain+0x12c/0x1f8a [ 159.290733][T11538] ? mark_held_locks+0xf0/0xf0 [ 159.295498][T11538] ? mark_held_locks+0xf0/0xf0 [ 159.300358][T11538] ? tomoyo_dump_page+0x510/0x510 [ 159.305381][T11538] ? lock_acquire+0x16f/0x3f0 [ 159.310057][T11538] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 159.315856][T11538] tomoyo_bprm_check_security+0x12a/0x1b0 [ 159.321560][T11538] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 159.327367][T11538] security_bprm_check+0x69/0xb0 [ 159.332291][T11538] search_binary_handler+0x77/0x570 [ 159.337478][T11538] ? kasan_check_read+0x11/0x20 [ 159.342317][T11538] __do_execve_file.isra.0+0x1394/0x23a0 [ 159.347940][T11538] ? copy_strings_kernel+0x110/0x110 [ 159.353206][T11538] ? strncpy_from_user+0x2ac/0x380 [ 159.358402][T11538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 159.364629][T11538] __ia32_compat_sys_execveat+0xf3/0x140 [ 159.370247][T11538] do_fast_syscall_32+0x281/0xd54 [ 159.375272][T11538] entry_SYSENTER_compat+0x70/0x7f [ 159.380364][T11538] RIP: 0023:0xf7f65849 [ 159.384413][T11538] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 159.404002][T11538] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 159.412401][T11538] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 159.420377][T11538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 08:52:26 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xfec0000000000000}, 0x1c) 08:52:26 executing program 2: personality(0x1bb2baf3005ac137) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001740)='/dev/vcs\x00', 0x200001, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x39, 0x2}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r1, 0x5}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0xc17, 0x3}, 0x8) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x3, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="e75caea8592c0c622071844289f57bf51d5842584f8d97f857b2ad09b4631cb448c4b13e9413b8dca2bb6b0d80c52b817b77f2e00fd3f27847bd2e94fb98a3145ad3949e6ab1276a43a5ac8c165210fb1c952e3288a3f68dea1ae40d2a43f99f9d45778c77df511c3e8ebe8cdc570df9feeea3918cc8e35033b02e7deb3d587c7bd3553798495f68356749cdb18c831e25755078c9bd1d30369bbda6ba4b8599047bedced354ac41f3d8c4933c031b822366a9744b66c7796c8a2a825e3a8746de64", 0xc2}], 0x1) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) write$P9_RVERSION(r2, &(0x7f00000002c0)={0x15, 0x65, 0xffff, 0x10000000, 0x8, '9P2000.u'}, 0x15) ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000001c0)={0x48c2, 0x3, 0x1}) r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000002, 0x2010, r2, 0x40000000) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) [ 159.428330][T11538] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 159.436281][T11538] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 159.444232][T11538] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:26 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0xff00000000000000}, 0x1c) 08:52:26 executing program 2: personality(0x1bb2baf3005ac137) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffffffffffffffd9, 0x40) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f00000000c0)={0x100000000, 0x8f, 0xb9, @random="2acd8fcabfc6", 'syzkaller0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) [ 159.486107][T11555] Invalid argument reading file caps for ./file0 [ 159.513204][T11563] Invalid argument reading file caps for ./file0 08:52:26 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') [ 159.635743][T11731] Invalid argument reading file caps for ./file0 [ 159.661993][T11754] Invalid argument reading file caps for ./file0 08:52:26 executing program 1 (fault-call:3 fault-nth:25): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:26 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x17) 08:52:26 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:26 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0185648, &(0x7f0000000100)={0x0, 0x8, 0x6, [], &(0x7f00000000c0)={0x9b0001, 0x400, [], @p_u32=&(0x7f0000000080)=0x6}}) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) 08:52:26 executing program 5: r0 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0xeed, 0xffffffffffffffb4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x81, "916392a203f2402d3c59f57ecaf0b171cb96f4e28faf86ee4fe294bfba56705595a6f829ca4a5da9c92ae267b4b46a9e534433fa1110f05b786582513cadc63e4a2c6b850b344196c99eec40186b2ea20073504fc347463418b66d42ab78fc863dc514ae5fe2f4b26788f4b0912d68835a7645c7dadb9162fb8b7d32124e26916e"}, &(0x7f0000000100)=0x89) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r1, 0x1000000000000000, 0x4}, &(0x7f00000001c0)=0xc) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file1\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x232, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:26 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x54000400, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:26 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x2040000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:26 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x20ef8d19) 08:52:26 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x488000, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x400, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x2) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000000080)={0x9, 0x1, 0x5, 0x93}) bind$isdn(r0, &(0x7f0000000240)={0x22, 0x0, 0x1000000000000000, 0x2a7a, 0xffffffffffffff04}, 0x6) [ 159.858982][T11795] FAULT_INJECTION: forcing a failure. [ 159.858982][T11795] name failslab, interval 1, probability 0, space 0, times 0 08:52:26 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 160.006327][T11795] CPU: 1 PID: 11795 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 160.013918][T11795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.023967][T11795] Call Trace: [ 160.023989][T11795] dump_stack+0x172/0x1f0 [ 160.024009][T11795] should_fail.cold+0xa/0x15 [ 160.024029][T11795] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 160.024053][T11795] ? ___might_sleep+0x163/0x280 [ 160.046856][T11795] __should_failslab+0x121/0x190 [ 160.051803][T11795] should_failslab+0x9/0x14 [ 160.055204][T11913] Invalid argument reading file caps for ./file0 [ 160.056314][T11795] kmem_cache_alloc+0x2b2/0x6f0 [ 160.056339][T11795] getname_kernel+0x53/0x370 [ 160.056357][T11795] kern_path+0x20/0x40 [ 160.076155][T11795] tomoyo_realpath_nofollow+0x74/0xdb [ 160.081543][T11795] ? tomoyo_realpath_from_path+0x730/0x730 [ 160.087361][T11795] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 160.093610][T11795] ? tomoyo_init_request_info+0x105/0x1d0 [ 160.099335][T11795] tomoyo_find_next_domain+0x28c/0x1f8a [ 160.099355][T11795] ? mark_held_locks+0xf0/0xf0 [ 160.099373][T11795] ? mark_held_locks+0xf0/0xf0 [ 160.114405][T11795] ? tomoyo_dump_page+0x510/0x510 [ 160.119445][T11795] ? lock_acquire+0x16f/0x3f0 [ 160.124127][T11795] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 160.129945][T11795] tomoyo_bprm_check_security+0x12a/0x1b0 [ 160.135663][T11795] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 160.135682][T11795] security_bprm_check+0x69/0xb0 [ 160.135700][T11795] search_binary_handler+0x77/0x570 [ 160.135717][T11795] ? kasan_check_read+0x11/0x20 [ 160.146437][T11795] __do_execve_file.isra.0+0x1394/0x23a0 [ 160.146461][T11795] ? copy_strings_kernel+0x110/0x110 [ 160.146480][T11795] ? strncpy_from_user+0x2ac/0x380 [ 160.172506][T11795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 160.178762][T11795] __ia32_compat_sys_execveat+0xf3/0x140 [ 160.184394][T11795] do_fast_syscall_32+0x281/0xd54 [ 160.184421][T11795] entry_SYSENTER_compat+0x70/0x7f [ 160.184431][T11795] RIP: 0023:0xf7f65849 08:52:26 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fffffff, 0x40000) ioctl$VIDIOC_ENUMSTD(r0, 0xc0405619, &(0x7f0000000040)={0x5, 0xd0977db7bae9f61d, "450b2d3d5b29d68453ebb9b8713ff0c81a43b2cfb74d88d6", {0xa260, 0x4}, 0x7}) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:26 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 160.184449][T11795] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 160.218314][T11795] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 160.226726][T11795] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 160.234698][T11795] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 160.242751][T11795] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 160.250714][T11795] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 160.250722][T11795] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:27 executing program 1 (fault-call:3 fault-nth:26): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:27 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 08:52:27 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:27 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/166, 0xa6) open$dir(&(0x7f0000000080)='./file0/bus\x00', 0x8000, 0x102) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x15, r1, 0x0) 08:52:27 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x40, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) uselib(&(0x7f0000000040)='./file0\x00') [ 160.358840][T11928] Invalid argument reading file caps for ./file0 [ 160.369726][T11942] FAULT_INJECTION: forcing a failure. [ 160.369726][T11942] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.381278][T11944] Invalid argument reading file caps for ./file0 [ 160.382934][T11942] CPU: 0 PID: 11942 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 160.382946][T11942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.382951][T11942] Call Trace: [ 160.382976][T11942] dump_stack+0x172/0x1f0 [ 160.396813][T11942] should_fail.cold+0xa/0x15 [ 160.419090][T11942] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 160.419118][T11942] should_fail_alloc_page+0x50/0x60 [ 160.419137][T11942] __alloc_pages_nodemask+0x1a1/0x8d0 [ 160.435463][T11942] ? kmem_cache_alloc_trace+0x151/0x760 [ 160.441043][T11942] ? tomoyo_find_next_domain+0x12c/0x1f8a [ 160.446762][T11942] ? tomoyo_bprm_check_security+0x12a/0x1b0 [ 160.452659][T11942] ? __alloc_pages_slowpath+0x28b0/0x28b0 08:52:27 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000000)={0xbf, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xfff, 0x3, 'lblc\x00', 0x1, 0x1, 0x49}, 0x2c) 08:52:27 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 160.452673][T11942] ? find_held_lock+0x35/0x130 [ 160.452693][T11942] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 160.452713][T11942] cache_grow_begin+0x9c/0x860 [ 160.473748][T11942] ? getname_kernel+0x53/0x370 [ 160.478522][T11942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 160.484768][T11942] kmem_cache_alloc+0x62d/0x6f0 [ 160.489627][T11942] getname_kernel+0x53/0x370 [ 160.494223][T11942] kern_path+0x20/0x40 [ 160.498301][T11942] tomoyo_realpath_nofollow+0x74/0xdb 08:52:27 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x88) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000140)={0x40, "be6126a2b8f37aef477bc31974d730e52053898f58926b0f9c661af3be20bbfa", 0x3, 0x1}) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x1f, 0x4}, {0x6, 0x81}]}, 0x14, 0x2) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xd, 0x11, r1, 0x0) [ 160.503674][T11942] ? tomoyo_realpath_from_path+0x730/0x730 [ 160.503693][T11942] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 160.503708][T11942] ? tomoyo_init_request_info+0x105/0x1d0 [ 160.503727][T11942] tomoyo_find_next_domain+0x28c/0x1f8a [ 160.503750][T11942] ? mark_held_locks+0xf0/0xf0 [ 160.532210][T11942] ? mark_held_locks+0xf0/0xf0 [ 160.536979][T11942] ? tomoyo_dump_page+0x510/0x510 [ 160.542011][T11942] ? lock_acquire+0x16f/0x3f0 [ 160.546693][T11942] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 160.552513][T11942] tomoyo_bprm_check_security+0x12a/0x1b0 [ 160.558240][T11942] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 160.564048][T11942] security_bprm_check+0x69/0xb0 [ 160.564070][T11942] search_binary_handler+0x77/0x570 [ 160.564085][T11942] ? kasan_check_read+0x11/0x20 [ 160.564106][T11942] __do_execve_file.isra.0+0x1394/0x23a0 [ 160.564130][T11942] ? copy_strings_kernel+0x110/0x110 [ 160.564144][T11942] ? strncpy_from_user+0x2ac/0x380 [ 160.564165][T11942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 160.564184][T11942] __ia32_compat_sys_execveat+0xf3/0x140 [ 160.573472][T11950] Invalid argument reading file caps for ./file0 [ 160.574312][T11942] do_fast_syscall_32+0x281/0xd54 [ 160.574336][T11942] entry_SYSENTER_compat+0x70/0x7f [ 160.574348][T11942] RIP: 0023:0xf7f65849 [ 160.574363][T11942] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 160.574370][T11942] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 08:52:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0700000400000001000000000000000900000000006800ff7f000000000000000000000000000000000000000000000000000000003f00000000000000000080ffffffffffffff3f000000000000004500"/232]) [ 160.574383][T11942] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 160.574392][T11942] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 160.574407][T11942] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 160.595209][T11942] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 160.595217][T11942] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:27 executing program 1 (fault-call:3 fault-nth:27): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:27 executing program 2: personality(0x1bb2baf3005ac137) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000080)={0x5, 0xa3a, 0x2, 'queue1\x00', 0x2}) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x5, 0x13, r0, 0x80000000) 08:52:27 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:27 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x100000053, 0x1) write$FUSE_IOCTL(r0, &(0x7f0000000140)={0x20, 0x0, 0x8, {0x7, 0x0, 0x1, 0x100000001}}, 0x20) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000040)=r0) uname(&(0x7f00000000c0)=""/81) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = semget(0x2, 0x3, 0x8) semctl$IPC_INFO(r1, 0x4, 0x3, &(0x7f0000007dc0)=""/168) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000007ec0)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x2, 0xfffffffffffffe01}]}, 0xc, 0x3) recvmmsg(r0, &(0x7f0000007c80)=[{{&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/47, 0x2f}], 0x1, &(0x7f0000000340)=""/104, 0x68}, 0x6}, {{&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000440)=""/93, 0x5d}, {&(0x7f00000004c0)=""/191, 0xbf}], 0x4, &(0x7f0000002640)=""/4096, 0x1000}}, {{&(0x7f0000003640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000036c0)=""/4096, 0x1000}], 0x1, &(0x7f00000046c0)=""/212, 0xd4}, 0x1ff}, {{0x0, 0x0, &(0x7f0000006b00)=[{&(0x7f00000047c0)=""/4096, 0x1000}, {&(0x7f00000057c0)=""/196, 0xc4}, {&(0x7f00000058c0)=""/159, 0x9f}, {&(0x7f0000005980)=""/39, 0x27}, {&(0x7f00000059c0)=""/88, 0x58}, {&(0x7f0000005a40)=""/172, 0xac}, {&(0x7f0000005b00)=""/4096, 0x1000}], 0x7}, 0x8}, {{&(0x7f0000006b40)=@alg, 0x80, &(0x7f0000007bc0)=[{&(0x7f0000006bc0)=""/4096, 0x1000}], 0x1, &(0x7f0000007c00)=""/111, 0x6f}, 0x7f}], 0x5, 0x2, &(0x7f0000007d40)={0x0, 0x1c9c380}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000007d80)={r2, 0x1, 0x6, @random="df6f62585a00"}, 0x10) setxattr$trusted_overlay_nlink(&(0x7f0000007e80)='./file0\x00', &(0x7f0000007f00)='trusted.overlay.nlink\x00', &(0x7f0000007f40)={'U+', 0x6}, 0x28, 0x1) [ 160.712059][T11952] Invalid argument reading file caps for ./file0 08:52:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x20000000000) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x400, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x800, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000080)) [ 160.830094][T11977] FAULT_INJECTION: forcing a failure. [ 160.830094][T11977] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.843342][T11977] CPU: 1 PID: 11977 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 160.850893][T11977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.860952][T11977] Call Trace: [ 160.864253][T11977] dump_stack+0x172/0x1f0 [ 160.868609][T11977] should_fail.cold+0xa/0x15 [ 160.873213][T11977] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 160.879041][T11977] should_fail_alloc_page+0x50/0x60 [ 160.884249][T11977] __alloc_pages_nodemask+0x1a1/0x8d0 [ 160.889629][T11977] ? kmem_cache_alloc_trace+0x151/0x760 [ 160.895440][T11977] ? tomoyo_find_next_domain+0x12c/0x1f8a [ 160.901171][T11977] ? tomoyo_bprm_check_security+0x12a/0x1b0 [ 160.905707][T11983] Invalid argument reading file caps for ./file0 [ 160.907067][T11977] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 160.907087][T11977] ? find_held_lock+0x35/0x130 [ 160.916303][T11983] Invalid argument reading file caps for ./file0 [ 160.919108][T11977] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 160.919142][T11977] cache_grow_begin+0x9c/0x860 [ 160.919161][T11977] ? getname_kernel+0x53/0x370 [ 160.945501][T11977] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 160.951766][T11977] kmem_cache_alloc+0x62d/0x6f0 [ 160.956644][T11977] getname_kernel+0x53/0x370 [ 160.961238][T11977] kern_path+0x20/0x40 [ 160.965317][T11977] tomoyo_realpath_nofollow+0x74/0xdb [ 160.970701][T11977] ? tomoyo_realpath_from_path+0x730/0x730 [ 160.976516][T11977] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 160.982757][T11977] ? tomoyo_init_request_info+0x105/0x1d0 [ 160.988496][T11977] tomoyo_find_next_domain+0x28c/0x1f8a [ 160.994056][T11977] ? mark_held_locks+0xf0/0xf0 [ 160.998839][T11977] ? mark_held_locks+0xf0/0xf0 [ 161.003631][T11977] ? tomoyo_dump_page+0x510/0x510 [ 161.008667][T11977] ? lock_acquire+0x16f/0x3f0 [ 161.013438][T11977] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 161.019266][T11977] tomoyo_bprm_check_security+0x12a/0x1b0 [ 161.024984][T11977] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 161.030797][T11977] security_bprm_check+0x69/0xb0 [ 161.035763][T11977] search_binary_handler+0x77/0x570 [ 161.040964][T11977] ? kasan_check_read+0x11/0x20 [ 161.045825][T11977] __do_execve_file.isra.0+0x1394/0x23a0 [ 161.051481][T11977] ? copy_strings_kernel+0x110/0x110 [ 161.056774][T11977] ? strncpy_from_user+0x2ac/0x380 [ 161.061897][T11977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 161.068144][T11977] __ia32_compat_sys_execveat+0xf3/0x140 [ 161.073789][T11977] do_fast_syscall_32+0x281/0xd54 [ 161.078825][T11977] entry_SYSENTER_compat+0x70/0x7f [ 161.083932][T11977] RIP: 0023:0xf7f65849 [ 161.088002][T11977] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 161.107604][T11977] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 161.116014][T11977] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 08:52:27 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0xfffffffffffffffe) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 08:52:27 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e21, @multicast1}}) 08:52:27 executing program 0: r0 = socket$inet6(0xa, 0x2000000000000, 0x9) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x0, 'cpu'}, {0x2d, 'cpu'}, {0x2b, 'memory'}, {0x2b, 'pids'}]}, 0x18) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:27 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:27 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:27 executing program 4: clone(0xfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) socket$alg(0x26, 0x5, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000016c0)={'vcan0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000040)="f695f7e05667215582436898b8dbbc89e1a7b4572dbd1c9785177cefb9b49f90c0886981e5ff30db5e6de252475d6c1071", 0x31, 0x40000, &(0x7f0000001700)={0x11, 0x1f, r1, 0x1, 0x4, 0x6, @remote}, 0x14) 08:52:27 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x204000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 161.123986][T11977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 161.131949][T11977] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 161.139904][T11977] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 161.147860][T11977] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:28 executing program 1 (fault-call:3 fault-nth:28): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:28 executing program 2: personality(0x1bb2baf3005ac13a) mkdir(&(0x7f0000000280)='./file0\x00', 0x20) r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x82) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000001c0)) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x7, 0x4) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000140)={0x7, 0x4, 0x2, 0xffffffffffffff1c, 0x100, 0x6}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x2}, 0x28, 0x1) 08:52:28 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:28 executing program 0: socket$inet6(0xa, 0x1, 0x0) 08:52:28 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x4e22, @multicast2}}) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:28 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000100)={[{0xffffffffffffff35, 0xfff, 0x4, 0x80000001, 0x2, 0x7, 0x1, 0x10000, 0x332, 0x1ff, 0xffffffff, 0xc82, 0x9}, {0x20, 0x0, 0x0, 0x4e, 0x9, 0x1, 0x80000001, 0xd00d, 0x0, 0x7, 0xa269, 0x1000, 0x89ef}, {0x3ff, 0x0, 0x66100, 0xffffffffffff8001, 0x6, 0x2, 0x6, 0x7, 0x2, 0x1, 0x3a53, 0x9, 0xfffffffffffffff9}], 0x1f}) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000080)={0x2, 0x7f, 0x7, 0x400}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x2}) clone(0x100005, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x80080) 08:52:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup(r0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc2c45512, &(0x7f0000000000)={{0x9, 0x0, 0x4, 0x2dd, 'syz1\x00', 0x9}, 0x0, [0x20, 0x5, 0x9, 0x3ff, 0x18458bd9, 0x7fffffff, 0x1, 0x81, 0x81, 0x1f, 0x0, 0xffff, 0x3, 0x0, 0x1, 0x3ff, 0x5, 0xd4b2, 0xfd2, 0x18aa0f8a, 0x40, 0x4, 0xec39, 0x4, 0x8, 0x6, 0xd, 0x6, 0x0, 0xfffffffffffffff7, 0x40, 0x9, 0xff, 0x0, 0x1f, 0x1, 0xfff, 0x101, 0x1ff, 0x3f, 0x184, 0x100, 0x7, 0xc5a0, 0x200, 0x8000, 0x1, 0x6, 0x6, 0x800, 0x2, 0x2, 0x54, 0x7f, 0x3ff, 0x4, 0x0, 0xd9, 0x2, 0x101, 0x100000000, 0xd39, 0x4, 0x80, 0x2, 0x0, 0x1, 0x3, 0x100, 0x6e, 0x3ff, 0x4, 0x7, 0xbdd3, 0x4, 0x6, 0x6, 0x2, 0x1, 0x100000000, 0xd46, 0x7, 0x101, 0x8, 0x1f, 0x1000, 0x7, 0x7fffffff, 0x2, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80, 0x2, 0x7, 0xff, 0xfffffffffffffffd, 0x3e8, 0x7, 0x100000000000, 0x5, 0x10001, 0x4c508523, 0x1000, 0x7fff, 0x6, 0x4, 0x2b99, 0x9, 0x7, 0x10000, 0x1f, 0x2b, 0x1, 0x87, 0x3, 0x2, 0xfffffffffffffffa, 0x10000, 0x80000001, 0x1, 0x788, 0x10000, 0x8000, 0x9, 0xf03, 0x3f, 0x80c8]}) [ 161.471965][T12250] Invalid argument reading file caps for ./file0 08:52:28 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:28 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 161.534905][T12261] FAULT_INJECTION: forcing a failure. [ 161.534905][T12261] name failslab, interval 1, probability 0, space 0, times 0 08:52:28 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0x100000001) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) [ 161.642974][T12328] Invalid argument reading file caps for ./file0 [ 161.649688][T12261] CPU: 1 PID: 12261 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 161.657250][T12261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.667321][T12261] Call Trace: [ 161.670619][T12261] dump_stack+0x172/0x1f0 [ 161.674961][T12261] should_fail.cold+0xa/0x15 [ 161.679559][T12261] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 161.685383][T12261] ? ___might_sleep+0x163/0x280 [ 161.690257][T12261] __should_failslab+0x121/0x190 [ 161.695205][T12261] should_failslab+0x9/0x14 [ 161.699717][T12261] kmem_cache_alloc+0x2b2/0x6f0 [ 161.704569][T12261] ? kernel_text_address+0x73/0xf0 [ 161.704607][T12261] ? __kernel_text_address+0xd/0x40 [ 161.704626][T12261] __d_alloc+0x2e/0x8c0 [ 161.719052][T12261] d_alloc+0x4d/0x280 [ 161.723038][T12261] d_alloc_parallel+0xf4/0x1bc0 [ 161.723062][T12261] ? mark_held_locks+0xf0/0xf0 [ 161.723083][T12261] ? __d_lookup_rcu+0x6c0/0x6c0 [ 161.737501][T12261] ? find_held_lock+0x35/0x130 [ 161.742267][T12261] ? __d_lookup+0x40c/0x760 [ 161.746779][T12261] ? lockdep_init_map+0x1be/0x6d0 [ 161.751807][T12261] ? lockdep_init_map+0x1be/0x6d0 [ 161.756837][T12261] __lookup_slow+0x1ab/0x500 [ 161.756855][T12261] ? vfs_unlink+0x560/0x560 [ 161.756868][T12261] ? __d_lookup+0x433/0x760 [ 161.756901][T12261] ? kasan_check_write+0x14/0x20 [ 161.775371][T12261] lookup_slow+0x58/0x80 [ 161.779625][T12261] walk_component+0x74b/0x2000 [ 161.784407][T12261] ? refcount_dec_not_one+0x1f0/0x1f0 [ 161.789775][T12261] ? kasan_check_read+0x11/0x20 [ 161.789793][T12261] ? path_init+0x18f0/0x18f0 [ 161.789819][T12261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 161.805457][T12261] ? security_inode_permission+0xd5/0x110 [ 161.811186][T12261] ? inode_permission+0xb4/0x570 [ 161.816134][T12261] link_path_walk.part.0+0x5ab/0x1350 [ 161.821526][T12261] ? walk_component+0x2000/0x2000 [ 161.826541][T12261] ? save_stack+0x5c/0x90 [ 161.826554][T12261] ? save_stack+0x23/0x90 [ 161.826567][T12261] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 161.826581][T12261] ? path_mountpoint+0x1e60/0x1e60 [ 161.826598][T12261] path_lookupat.isra.0+0xe3/0x8d0 [ 161.826618][T12261] ? do_fast_syscall_32+0x281/0xd54 [ 161.841037][T12261] ? path_parentat.isra.0+0x160/0x160 [ 161.841057][T12261] ? cache_grow_end+0xa4/0x190 [ 161.841076][T12261] ? find_held_lock+0x35/0x130 [ 161.856445][T12261] ? cache_grow_end+0xa4/0x190 [ 161.856465][T12261] filename_lookup+0x1b0/0x410 [ 161.856482][T12261] ? nd_jump_link+0x1d0/0x1d0 [ 161.856510][T12261] ? simple_attr_release+0x50/0x50 08:52:28 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:28 executing program 2: personality(0x1bb2baf3005ac133) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 161.856531][T12261] ? memcpy+0x46/0x50 [ 161.866625][T12261] ? getname_kernel+0x223/0x370 [ 161.866646][T12261] kern_path+0x36/0x40 [ 161.903505][T12261] tomoyo_realpath_nofollow+0x74/0xdb [ 161.908888][T12261] ? tomoyo_realpath_from_path+0x730/0x730 [ 161.914700][T12261] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 161.920938][T12261] ? tomoyo_init_request_info+0x105/0x1d0 [ 161.921931][T12369] Invalid argument reading file caps for ./file0 [ 161.926661][T12261] tomoyo_find_next_domain+0x28c/0x1f8a [ 161.926683][T12261] ? mark_held_locks+0xf0/0xf0 [ 161.926701][T12261] ? mark_held_locks+0xf0/0xf0 [ 161.948054][T12261] ? tomoyo_dump_page+0x510/0x510 [ 161.953087][T12261] ? lock_acquire+0x16f/0x3f0 [ 161.957759][T12261] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 161.963564][T12261] tomoyo_bprm_check_security+0x12a/0x1b0 [ 161.969285][T12261] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 161.975090][T12261] security_bprm_check+0x69/0xb0 [ 161.980027][T12261] search_binary_handler+0x77/0x570 [ 161.985220][T12261] ? kasan_check_read+0x11/0x20 [ 161.990079][T12261] __do_execve_file.isra.0+0x1394/0x23a0 [ 161.995725][T12261] ? copy_strings_kernel+0x110/0x110 [ 162.001005][T12261] ? strncpy_from_user+0x2ac/0x380 [ 162.006112][T12261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 162.006134][T12261] __ia32_compat_sys_execveat+0xf3/0x140 [ 162.017987][T12261] do_fast_syscall_32+0x281/0xd54 [ 162.018008][T12261] entry_SYSENTER_compat+0x70/0x7f [ 162.018024][T12261] RIP: 0023:0xf7f65849 [ 162.032170][T12261] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 162.051768][T12261] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 162.060158][T12261] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 162.068105][T12261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 162.076056][T12261] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 162.084007][T12261] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 08:52:28 executing program 1 (fault-call:3 fault-nth:29): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:28 executing program 0: syz_open_dev$media(&(0x7f0000002280)='/dev/media#\x00', 0x100000001, 0x14000) r0 = syz_open_dev$sndpcmc(&(0x7f0000001040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000022c0)=""/4096, &(0x7f00000032c0)=0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000020c0)='/dev/null\x00', 0x2401, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000002200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000021c0), &(0x7f0000002240)=0x4) fgetxattr(r2, &(0x7f0000000000)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000040)=""/4096, 0x13e2) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000002100)={'nat\x00'}, &(0x7f0000002180)=0x54) 08:52:28 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:28 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@empty, 0xffffffffffffffff, 0x3, 0xff, 0x1, 0xffff, 0x40}, &(0x7f0000000140)=0x20) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r1, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/bus\x00') 08:52:28 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000000)={0x3ff, 0x7, 0x2, 0x20, 0x6, 0x4e9, 0xa}) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x31) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:28 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x100000001, 0x8000) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000200)={0xb, {0x0, 0x7ff, 0x4d, 0x6}}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000340)={[], 0xfffffffeffffffff, 0x8, 0x4, 0x0, 0x5, 0xd000, 0xf000, [], 0x5}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) r2 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x10012, 0xffffffffffffffff, 0x30) ioctl$VIDIOC_QUERYBUF(r1, 0xc0445609, &(0x7f00000000c0)={0x800, 0xb, 0x4, 0x80000000, {}, {0x4, 0x8, 0x7f, 0x6, 0x7fffffff, 0x0, "60319b54"}, 0x80000000, 0x1, @offset=0x5, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a45321, &(0x7f0000000140)={{0x4, 0x10001}, 'port0\x00', 0x1762696cabced5b6, 0x2, 0x7ff, 0x2, 0x4, 0xfff, 0x6, 0x0, 0x4, 0xfffffffffffffff9}) epoll_create1(0x80000) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000040)={r2}) [ 162.091964][T12261] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 162.146208][T12398] Invalid argument reading file caps for ./file0 [ 162.162819][T12402] Invalid argument reading file caps for ./file0 [ 162.186036][T12406] FAULT_INJECTION: forcing a failure. 08:52:28 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) capset(&(0x7f0000000040)={0x399f1736, r1}, &(0x7f0000000080)={0x5, 0xfffffffffffffffc, 0x683, 0x0, 0x7, 0x80000001}) getpid() bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 162.186036][T12406] name failslab, interval 1, probability 0, space 0, times 0 [ 162.213901][T12406] CPU: 1 PID: 12406 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 162.221473][T12406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.221480][T12406] Call Trace: [ 162.221500][T12406] dump_stack+0x172/0x1f0 [ 162.221521][T12406] should_fail.cold+0xa/0x15 [ 162.243743][T12406] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 162.249565][T12406] ? ___might_sleep+0x163/0x280 [ 162.254426][T12406] __should_failslab+0x121/0x190 [ 162.259377][T12406] ? proc_free_inode+0x20/0x20 [ 162.264144][T12406] should_failslab+0x9/0x14 [ 162.268653][T12406] kmem_cache_alloc+0x2b2/0x6f0 [ 162.273509][T12406] ? find_held_lock+0x35/0x130 [ 162.278276][T12406] ? tid_fd_mode+0x215/0x3f0 [ 162.278295][T12406] ? proc_free_inode+0x20/0x20 [ 162.278309][T12406] proc_alloc_inode+0x1c/0x1a0 [ 162.278328][T12406] alloc_inode+0x6a/0x1e0 [ 162.294035][T12416] Invalid argument reading file caps for ./file0 [ 162.296714][T12406] new_inode_pseudo+0x19/0xf0 [ 162.296732][T12406] new_inode+0x1f/0x40 [ 162.296750][T12406] proc_pid_make_inode+0x22/0x230 [ 162.296765][T12406] proc_fd_instantiate+0x58/0x1f0 [ 162.296783][T12406] proc_lookupfd_common+0x126/0x1c0 [ 162.311801][T12406] ? tid_fd_update_inode+0xf0/0xf0 [ 162.311818][T12406] ? tid_fd_revalidate+0x230/0x230 [ 162.311834][T12406] ? lockdep_init_map+0x1be/0x6d0 [ 162.311852][T12406] ? lockdep_init_map+0x1be/0x6d0 [ 162.328280][T12418] Invalid argument reading file caps for ./file0 [ 162.332145][T12406] proc_lookupfd+0x25/0x30 [ 162.332162][T12406] __lookup_slow+0x27e/0x500 [ 162.332179][T12406] ? vfs_unlink+0x560/0x560 [ 162.332192][T12406] ? __d_lookup+0x433/0x760 [ 162.332222][T12406] ? kasan_check_write+0x14/0x20 [ 162.347947][T12406] lookup_slow+0x58/0x80 [ 162.347964][T12406] walk_component+0x74b/0x2000 [ 162.347982][T12406] ? inode_permission+0xb4/0x570 [ 162.391098][T12406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 162.397362][T12406] ? path_init+0x18f0/0x18f0 [ 162.401997][T12406] ? walk_component+0x2000/0x2000 [ 162.413015][T12406] ? save_stack+0x5c/0x90 [ 162.417355][T12406] ? save_stack+0x23/0x90 [ 162.421685][T12406] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 162.427491][T12406] ? path_mountpoint+0x1e60/0x1e60 [ 162.432600][T12406] path_lookupat.isra.0+0x1f5/0x8d0 [ 162.437807][T12406] ? do_fast_syscall_32+0x281/0xd54 [ 162.437825][T12406] ? path_parentat.isra.0+0x160/0x160 [ 162.437839][T12406] ? mark_held_locks+0xf0/0xf0 [ 162.437851][T12406] ? save_stack+0x5c/0x90 [ 162.437867][T12406] ? save_stack+0x23/0x90 [ 162.461776][T12406] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 162.467572][T12406] ? kasan_kmalloc+0x9/0x10 [ 162.467588][T12406] ? kmem_cache_alloc_trace+0x151/0x760 [ 162.467603][T12406] ? tomoyo_find_next_domain+0x12c/0x1f8a [ 162.467617][T12406] ? tomoyo_bprm_check_security+0x12a/0x1b0 [ 162.467635][T12406] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 162.467654][T12406] filename_lookup+0x1b0/0x410 [ 162.467668][T12406] ? nd_jump_link+0x1d0/0x1d0 [ 162.467696][T12406] ? simple_attr_release+0x50/0x50 [ 162.509451][T12406] ? memcpy+0x46/0x50 [ 162.513450][T12406] ? getname_kernel+0x223/0x370 [ 162.518309][T12406] kern_path+0x36/0x40 [ 162.518862][T12429] Invalid argument reading file caps for ./file0 [ 162.522395][T12406] tomoyo_realpath_nofollow+0x74/0xdb [ 162.522414][T12406] ? tomoyo_realpath_from_path+0x730/0x730 [ 162.522432][T12406] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 162.522444][T12406] ? tomoyo_init_request_info+0x105/0x1d0 [ 162.522463][T12406] tomoyo_find_next_domain+0x28c/0x1f8a [ 162.551849][T12406] ? mark_held_locks+0xf0/0xf0 [ 162.562121][T12406] ? mark_held_locks+0xf0/0xf0 [ 162.562143][T12406] ? tomoyo_dump_page+0x510/0x510 [ 162.562160][T12406] ? lock_acquire+0x16f/0x3f0 [ 162.562173][T12406] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 162.562193][T12406] tomoyo_bprm_check_security+0x12a/0x1b0 [ 162.568264][T12430] Invalid argument reading file caps for ./file0 08:52:28 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x100000000, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000080)) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x8000000011, r0, 0x0) recvfrom$inet(r0, &(0x7f0000000040)=""/2, 0x2, 0x0, &(0x7f00000000c0)={0x2, 0x4e1e, @loopback}, 0x10) 08:52:28 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x40) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:29 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7ff, 0x9, 0xec46, 0xe82f, 0x100000001, 0x3, 0x3e, 0xffffffffffffa1c8, 0x7a, 0x40, 0x2a0, 0x5, 0x4, 0x38, 0x1, 0x1, 0x3, 0x81}, [{0x2, 0x2, 0x8, 0x1, 0x1, 0x2, 0x7, 0x26}, {0x60000007, 0x8, 0x8001, 0x9, 0x8, 0x2, 0x8, 0x3}], "ce4b6d7b15dc79612a70cb", [[], [], [], [], [], [], [], []]}, 0x8bb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) fstat(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000980)='./file0/bus/file0\x00', &(0x7f00000009c0)='fuse\x00', 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000160000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB=',allow_other,max_read=0x0000000000000009,max_read=0x0000000000000003,smackfsdef=@{-,%system,uid>', @ANYRESDEC=r5, @ANYBLOB="2c736d61636b6673720400743d2f6465762f63757365002c6f626a5f747970653d27657468312c736d61636b66736465663d2c6f626a5f726f6c653d5b6e6f6465762e657468312c00"]) 08:52:29 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:52:29 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = getpgrp(0x0) write$P9_RGETLOCK(r0, &(0x7f00000000c0)={0x2f, 0x37, 0x1, {0x0, 0x1, 0x401, r1, 0x11, '\x91vboxnet0security'}}, 0x2f) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x11d, 0x4) [ 162.571945][T12406] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 162.571966][T12406] security_bprm_check+0x69/0xb0 [ 162.571987][T12406] search_binary_handler+0x77/0x570 [ 162.571999][T12406] ? kasan_check_read+0x11/0x20 [ 162.572019][T12406] __do_execve_file.isra.0+0x1394/0x23a0 [ 162.615255][T12406] ? copy_strings_kernel+0x110/0x110 [ 162.615269][T12406] ? strncpy_from_user+0x2ac/0x380 [ 162.615290][T12406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 162.626179][T12406] __ia32_compat_sys_execveat+0xf3/0x140 [ 162.626203][T12406] do_fast_syscall_32+0x281/0xd54 [ 162.626230][T12406] entry_SYSENTER_compat+0x70/0x7f [ 162.626242][T12406] RIP: 0023:0xf7f65849 [ 162.626261][T12406] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 162.676953][T12406] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 162.685354][T12406] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 162.693314][T12406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 162.701264][T12406] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 162.709219][T12406] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 162.717187][T12406] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 08:52:29 executing program 1 (fault-call:3 fault-nth:30): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:29 executing program 2: personality(0x1bb2baf3005ac137) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xebc, 0x80100) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/234) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000001c0)={0x2}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) bind$tipc(r1, &(0x7f0000000300)=@name={0x1e, 0x2, 0x1, {{0x1}, 0x1}}, 0x10) write$UHID_INPUT2(r0, &(0x7f0000000200)={0xc, 0xe2, "14ccd6aaa360c8c21c20047c8392bad36be8b760b2628769bb8b2b6a9c9a380443d80138f5a9f15f2404a163ae7e9184b565c9cde465849af209e66eaa3dc4fe929a52dcd5ab0cf4b7b125eb239dc7a21da5e15f4ec6d440a64146871435af3d516e1819a6f94d801fbd7a20af15ec9e401fc46e27804849f569f60c81bff8c29b565d3d9c282e252b417559f622925b17dd4cc299a9bccf11fd7c7bb2e2baad7e6893a19c84310816191786e085ae6d765467e2cd04a265190fa3f5e523e24ba9bdc7b5eb3737a9a46f23eb9ee82c4685477062567ed9f5894d8b33d798f97c079e"}, 0xe8) r2 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0x0) 08:52:29 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x3a8, 0x0) 08:52:29 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:29 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x91, 0x8000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40046607, &(0x7f0000000080)=0x1) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 08:52:29 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setns(r0, 0x2020000) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x10000) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000040)={0x1, 0x0, {0x100000000, 0x2}}) 08:52:29 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x800, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x62, 0x101000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x4, 0x2, 0x1, r1}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U-', 0xffffffffffff7fff}, 0x28, 0x3) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) write$P9_RWRITE(r2, &(0x7f0000000000)={0xb, 0x77, 0x2, 0xfffffffffffffc00}, 0xb) [ 162.853305][T12550] FAULT_INJECTION: forcing a failure. [ 162.853305][T12550] name failslab, interval 1, probability 0, space 0, times 0 08:52:29 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) pipe(&(0x7f0000000080)) [ 162.896342][T12550] CPU: 1 PID: 12550 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 162.903922][T12550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.913981][T12550] Call Trace: [ 162.914004][T12550] dump_stack+0x172/0x1f0 [ 162.914024][T12550] should_fail.cold+0xa/0x15 [ 162.914041][T12550] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 162.914062][T12550] ? ___might_sleep+0x163/0x280 [ 162.936883][T12550] __should_failslab+0x121/0x190 [ 162.941829][T12550] should_failslab+0x9/0x14 [ 162.946340][T12550] kmem_cache_alloc+0x2b2/0x6f0 [ 162.951205][T12550] ? lock_downgrade+0x880/0x880 [ 162.956064][T12550] __d_alloc+0x2e/0x8c0 [ 162.960229][T12550] d_alloc+0x4d/0x280 [ 162.964220][T12550] d_alloc_parallel+0xf4/0x1bc0 [ 162.969077][T12550] ? is_dynamic_key+0x1c0/0x1c0 [ 162.973937][T12550] ? mark_held_locks+0xf0/0xf0 [ 162.978708][T12550] ? __d_lookup_rcu+0x6c0/0x6c0 [ 162.983557][T12550] ? find_held_lock+0x35/0x130 [ 162.988321][T12550] ? __d_lookup+0x40c/0x760 [ 162.992825][T12550] ? lockdep_init_map+0x1be/0x6d0 [ 162.997854][T12550] ? lockdep_init_map+0x1be/0x6d0 [ 163.002878][T12550] __lookup_slow+0x1ab/0x500 [ 163.007473][T12550] ? vfs_unlink+0x560/0x560 [ 163.011956][T12550] ? __d_lookup+0x433/0x760 [ 163.016456][T12550] ? kasan_check_write+0x14/0x20 [ 163.021377][T12550] lookup_slow+0x58/0x80 [ 163.025601][T12550] walk_component+0x74b/0x2000 [ 163.030345][T12550] ? inode_permission+0xb4/0x570 [ 163.035267][T12550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 163.041513][T12550] ? path_init+0x18f0/0x18f0 [ 163.046089][T12550] ? walk_component+0x2000/0x2000 [ 163.051092][T12550] ? save_stack+0x5c/0x90 [ 163.055401][T12550] ? save_stack+0x23/0x90 [ 163.059711][T12550] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 163.065496][T12550] ? path_mountpoint+0x1e60/0x1e60 [ 163.070592][T12550] path_lookupat.isra.0+0x1f5/0x8d0 [ 163.075771][T12550] ? do_fast_syscall_32+0x281/0xd54 [ 163.080954][T12550] ? path_parentat.isra.0+0x160/0x160 [ 163.086312][T12550] ? cache_grow_end+0xa4/0x190 [ 163.091058][T12550] ? find_held_lock+0x35/0x130 [ 163.095805][T12550] ? cache_grow_end+0xa4/0x190 [ 163.100552][T12550] filename_lookup+0x1b0/0x410 [ 163.105300][T12550] ? nd_jump_link+0x1d0/0x1d0 [ 163.109985][T12550] ? simple_attr_release+0x50/0x50 [ 163.115084][T12550] ? memcpy+0x46/0x50 [ 163.119049][T12550] ? getname_kernel+0x223/0x370 [ 163.123882][T12550] kern_path+0x36/0x40 [ 163.127937][T12550] tomoyo_realpath_nofollow+0x74/0xdb [ 163.133298][T12550] ? tomoyo_realpath_from_path+0x730/0x730 [ 163.139088][T12550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 163.145308][T12550] ? tomoyo_init_request_info+0x105/0x1d0 [ 163.151009][T12550] tomoyo_find_next_domain+0x28c/0x1f8a [ 163.156539][T12550] ? mark_held_locks+0xf0/0xf0 [ 163.161289][T12550] ? mark_held_locks+0xf0/0xf0 [ 163.166032][T12550] ? tomoyo_dump_page+0x510/0x510 [ 163.171037][T12550] ? lock_acquire+0x16f/0x3f0 [ 163.175696][T12550] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 163.181500][T12550] tomoyo_bprm_check_security+0x12a/0x1b0 [ 163.187211][T12550] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 163.193001][T12550] security_bprm_check+0x69/0xb0 [ 163.197923][T12550] search_binary_handler+0x77/0x570 [ 163.203103][T12550] ? kasan_check_read+0x11/0x20 [ 163.207950][T12550] __do_execve_file.isra.0+0x1394/0x23a0 [ 163.213570][T12550] ? copy_strings_kernel+0x110/0x110 [ 163.218835][T12550] ? strncpy_from_user+0x2ac/0x380 [ 163.223929][T12550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 163.230152][T12550] __ia32_compat_sys_execveat+0xf3/0x140 [ 163.235785][T12550] do_fast_syscall_32+0x281/0xd54 [ 163.240795][T12550] entry_SYSENTER_compat+0x70/0x7f [ 163.245885][T12550] RIP: 0023:0xf7f65849 [ 163.249936][T12550] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 163.269516][T12550] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 163.277905][T12550] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 163.285857][T12550] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 08:52:30 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) 08:52:30 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 163.293810][T12550] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 163.301760][T12550] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 163.309714][T12550] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 163.328198][T12564] Invalid argument reading file caps for ./file0 08:52:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x38c, 0x150, 0x150, 0x0, 0x150, 0x0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x3, &(0x7f0000000040), {[{{@uncond, 0x0, 0x110, 0x150, 0x0, {}, [@common=@hl={0x24, 'hl\x00', 0x0, {0x2, 0x40}}, @common=@icmp6={0x24, 'icmp6\x00', 0x0, {0xd, 0x80000000, 0x5, 0x1}}]}, @unspec=@CT0={0x40, 'CT\x00', 0x0, {0x0, 0x2, 0x9, 0x9, 'netbios-ns\x00'}}}, {{@uncond, 0x0, 0x110, 0x170, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0xe}}, @inet=@rpfilter={0x24, 'rpfilter\x00'}]}, @unspec=@CT1={0x60, 'CT\x00', 0x1, {0x9, 0x8, 0x101, 0xb8, 'pptp\x00', 'syz1\x00', 0xffff}}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x3e8) r1 = dup(r0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)={0x3, r1}) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x1000000, @mcast1, 0x1}, 0xfffffffffffffe94) [ 163.377727][T12564] Invalid argument reading file caps for ./file0 08:52:30 executing program 2: personality(0xfffffe) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000200)='./file0/bus\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_getaffinity(r2, 0x8, &(0x7f0000000100)) execveat(r0, &(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000140)=[&(0x7f00000000c0)='em1\x00', &(0x7f0000000240)='!&\\\x00'], &(0x7f00000001c0)=[&(0x7f0000000180)='em1\x00'], 0x500) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x9, 0x11, r0, 0x1000000000) ioctl$RTC_PIE_ON(r0, 0x7005) 08:52:30 executing program 1 (fault-call:3 fault-nth:31): r0 = memfd_create(&(0x7f00000000c0)='.\x98U\xa1>\xda\xdf=K#\xe7\b\xe1S\x00\a\xa1D\x98#Gv\xe9Fz_\xc1\xce\x843\xb8\xac\xfe\xf6@\xe3', 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x7c0, 0xffffffffffffffff) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:52:30 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) 08:52:30 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x204, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:30 executing program 4: clone(0x20001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:30 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) chown(&(0x7f0000000080)='./file0/bus\x00', r1, r2) r3 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r3, 0x0) 08:52:30 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0xa1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x103000, 0x0) getegid() 08:52:30 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @loopback}, 0x1c) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 163.611546][T12710] FAULT_INJECTION: forcing a failure. [ 163.611546][T12710] name failslab, interval 1, probability 0, space 0, times 0 08:52:30 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:52:30 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 163.712548][T12710] CPU: 1 PID: 12710 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 163.720166][T12710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.730238][T12710] Call Trace: [ 163.733539][T12710] dump_stack+0x172/0x1f0 [ 163.737884][T12710] should_fail.cold+0xa/0x15 [ 163.742486][T12710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 163.748296][T12710] ? ___might_sleep+0x163/0x280 [ 163.748319][T12710] __should_failslab+0x121/0x190 [ 163.748335][T12710] should_failslab+0x9/0x14 08:52:30 executing program 5: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) time(&(0x7f0000000040)) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x7423, 0x80000) [ 163.748354][T12710] __kmalloc+0x2dc/0x740 [ 163.758114][T12710] ? tomoyo_unix_entry.cold+0x22/0x22 [ 163.758138][T12710] ? tomoyo_encode2.part.0+0xf5/0x400 [ 163.777595][T12710] tomoyo_encode2.part.0+0xf5/0x400 [ 163.782807][T12710] tomoyo_encode+0x2b/0x50 [ 163.787254][T12710] tomoyo_realpath_from_path+0x1c6/0x730 [ 163.792888][T12710] tomoyo_realpath_nofollow+0xc8/0xdb [ 163.798268][T12710] ? tomoyo_realpath_from_path+0x730/0x730 [ 163.804088][T12710] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 08:52:30 executing program 2: personality(0x1bb2baf3005ac137) dup2(0xffffffffffffffff, 0xffffffffffffff9c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x9, 0x11, r0, 0x0) [ 163.810340][T12710] ? tomoyo_init_request_info+0x105/0x1d0 [ 163.816070][T12710] tomoyo_find_next_domain+0x28c/0x1f8a [ 163.821681][T12710] ? mark_held_locks+0xf0/0xf0 [ 163.826456][T12710] ? mark_held_locks+0xf0/0xf0 [ 163.829738][T12757] Invalid argument reading file caps for ./file0 [ 163.831229][T12710] ? tomoyo_dump_page+0x510/0x510 [ 163.831248][T12710] ? lock_acquire+0x16f/0x3f0 [ 163.831262][T12710] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 163.831282][T12710] tomoyo_bprm_check_security+0x12a/0x1b0 08:52:30 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8004700b, &(0x7f0000000000)) [ 163.851978][T12757] Invalid argument reading file caps for ./file0 [ 163.853050][T12710] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 163.853070][T12710] security_bprm_check+0x69/0xb0 [ 163.853089][T12710] search_binary_handler+0x77/0x570 [ 163.853107][T12710] ? kasan_check_read+0x11/0x20 [ 163.885861][T12710] __do_execve_file.isra.0+0x1394/0x23a0 [ 163.891507][T12710] ? copy_strings_kernel+0x110/0x110 [ 163.896798][T12710] ? strncpy_from_user+0x2ac/0x380 [ 163.901912][T12710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 163.908147][T12710] __ia32_compat_sys_execveat+0xf3/0x140 [ 163.908169][T12710] do_fast_syscall_32+0x281/0xd54 [ 163.908192][T12710] entry_SYSENTER_compat+0x70/0x7f [ 163.924009][T12710] RIP: 0023:0xf7f65849 [ 163.928081][T12710] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 163.947686][T12710] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 163.951100][T12764] Invalid argument reading file caps for ./file0 [ 163.956094][T12710] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 163.956108][T12710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 163.956116][T12710] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 163.956124][T12710] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 163.956133][T12710] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 164.037416][T12830] Invalid argument reading file caps for ./file0 [ 164.073476][T12710] ERROR: Out of memory at tomoyo_realpath_from_path. [ 164.097759][T12710] Kernel panic - not syncing: MAC Initialization failed. [ 164.104820][T12710] CPU: 1 PID: 12710 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 164.112370][T12710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.122415][T12710] Call Trace: [ 164.125698][T12710] dump_stack+0x172/0x1f0 [ 164.130011][T12710] panic+0x2cb/0x65c [ 164.133894][T12710] ? __warn_printk+0xf3/0xf3 [ 164.138466][T12710] ? kfree+0x173/0x230 [ 164.142514][T12710] ? tomoyo_realpath_from_path+0x1d1/0x730 [ 164.148307][T12710] ? kfree+0x173/0x230 [ 164.152355][T12710] ? tomoyo_warn_oom.cold+0x24/0x43 [ 164.157532][T12710] tomoyo_warn_oom.cold+0x35/0x43 [ 164.162535][T12710] tomoyo_realpath_from_path+0x3a8/0x730 [ 164.168150][T12710] tomoyo_realpath_nofollow+0xc8/0xdb [ 164.173497][T12710] ? tomoyo_realpath_from_path+0x730/0x730 [ 164.179284][T12710] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 164.185499][T12710] ? tomoyo_init_request_info+0x105/0x1d0 [ 164.191202][T12710] tomoyo_find_next_domain+0x28c/0x1f8a [ 164.196736][T12710] ? mark_held_locks+0xf0/0xf0 [ 164.201477][T12710] ? mark_held_locks+0xf0/0xf0 [ 164.206216][T12710] ? tomoyo_dump_page+0x510/0x510 [ 164.211215][T12710] ? lock_acquire+0x16f/0x3f0 [ 164.215870][T12710] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 164.221656][T12710] tomoyo_bprm_check_security+0x12a/0x1b0 [ 164.227547][T12710] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 164.233331][T12710] security_bprm_check+0x69/0xb0 [ 164.238248][T12710] search_binary_handler+0x77/0x570 [ 164.243421][T12710] ? kasan_check_read+0x11/0x20 [ 164.248265][T12710] __do_execve_file.isra.0+0x1394/0x23a0 [ 164.253878][T12710] ? copy_strings_kernel+0x110/0x110 [ 164.259139][T12710] ? strncpy_from_user+0x2ac/0x380 [ 164.264230][T12710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.270459][T12710] __ia32_compat_sys_execveat+0xf3/0x140 [ 164.276074][T12710] do_fast_syscall_32+0x281/0xd54 [ 164.281098][T12710] entry_SYSENTER_compat+0x70/0x7f [ 164.286195][T12710] RIP: 0023:0xf7f65849 [ 164.290244][T12710] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 164.309995][T12710] RSP: 002b:00000000f5d610cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 164.318381][T12710] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 164.326329][T12710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 164.334280][T12710] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 164.342248][T12710] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 164.350221][T12710] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 164.360188][T12710] Kernel Offset: disabled [ 164.364616][T12710] Rebooting in 86400 seconds..