last executing test programs: 1m32.11432153s ago: executing program 3 (id=34): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, r0) r1 = syz_usb_connect(0x3, 0x36, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r0, @ANYRES64=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRESHEX, @ANYBLOB="8ee56adb76c3da9954e7123fde39d859b7ce92be1303c63a38f6557919c1eeaa5be2d991dd634ec6d6b231a526affa61ce6ce522c17219a19d7de54abd4e78ff569d767871228cea41d6d670d418e468f512cc9728aa7fb966e1cbcf8776a4b66999ec158dccf913d91293752e091046", @ANYBLOB="565a10f2209b7ee07d4ede337234bfd5cad80e0b522aad6b850dd95dd825692017628991e5072b04f0cb273716522c4987d433aabd08b3067f758d880000", @ANYRESHEX=r0], 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) (async) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) 1m29.096283265s ago: executing program 3 (id=55): r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') fcntl$setsig(r0, 0xa, 0x10) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x7, 0x4, 0x3c0, 0x108, 0x1f0, 0x0, 0x108, 0x2d8, 0x108, 0x4, 0x0, {[{{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0xe8, 0x0, {0xa00}}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x447) 1m29.021715667s ago: executing program 3 (id=56): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000b80)=""/227, 0xe3}, {&(0x7f0000001a40)=""/217, 0xd9}, {&(0x7f0000004500)=""/4090, 0xffa}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000000680)=""/122, 0x7a}, {&(0x7f0000002c40)=""/146, 0x92}, {&(0x7f00000004c0)=""/128, 0x80}, {&(0x7f0000000000)=""/260, 0x104}, {&(0x7f0000000400)=""/88, 0x58}], 0x9, 0x0, 0x0, 0xc3ff}, 0xe}, {{0x0, 0x0, 0x0}, 0xa}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, 0x0}, 0xffffffff}, {{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0}, 0x4}], 0x7, 0x40000100, 0x0) 1m29.021130038s ago: executing program 3 (id=57): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x220001, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000040)=0x4200080) lsm_get_self_attr(0x68, 0x0, &(0x7f0000000380), 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000000c0)={0xcf50, 0x0, 0xffff, 0x9e02, 0x15}) write$binfmt_aout(r1, &(0x7f0000001140)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0xfffffff9, 0x3, 0xd, "0062007d82000000000000002240f7ffffff00"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000100)=0x17) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000440)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000780)={'pim6reg0\x00', 0x400}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2c0800, 0x0) close(r5) mkdir(&(0x7f00000003c0)='./file0\x00', 0x21) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000040), 0x82, 0x0) chroot(&(0x7f0000001140)='./file0\x00') unshare(0x60000600) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1a05400, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0/../file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00 \x00'}) syz_usb_connect$uac2(0x3, 0x89, &(0x7f0000005480)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x20, 0x154e, 0x500e, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x77, 0x3, 0x1, 0x0, 0xd0, 0x9, {0x8, 0xb, 0x1, 0x1, 0x1, 0xff, 0x20, 0xc0}, {{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x20, 0x0, {{0x9, 0x24, 0x1, 0x1ff, 0xff, 0x17}, [@multiply_unit={0x7, 0x24, 0xc, 0x80, 0x0, 0x7, 0x7}, @multiply_unit={0x7, 0x24, 0xc, 0x8, 0xc, 0x14, 0x3}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x20, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x20, 0x6, 0x2, 0x5, {0x8, 0x25, 0x1, 0x83, 0x18, 0xe2, 0xe3}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x20, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x3ff, 0x9, 0x1, 0xea, {0x8, 0x25, 0x1, 0x0, 0x3f, 0x2, 0x9}}}}}}}}]}}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = creat(&(0x7f0000000080)='./file0\x00', 0xc7) close(r6) r7 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r7, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000), 0x101000, 0x800, 0x3, 0x1}, 0x20) setsockopt$XDP_TX_RING(r7, 0x11b, 0x3, &(0x7f00000003c0)=0x800, 0x4) 1m25.967337609s ago: executing program 3 (id=76): r0 = syz_open_dev$loop(&(0x7f0000000000), 0x9, 0x881) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 1m25.625525846s ago: executing program 3 (id=83): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x200a, 0x2}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000280)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x10a}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x10, 0x0, &(0x7f0000000900)=[@acquire, @acquire={0x40046305, 0x3}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000680)={0x4c, 0x110000000000000, &(0x7f00000006c0)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x48, 0x18, &(0x7f00000005c0)={@flat=@binder={0x73622a85, 0x1, 0x1}, @flat=@binder={0x73622a85, 0x190b, 0x3}, @fd}, &(0x7f0000000140)={0x0, 0x18, 0x30}}, 0x40}], 0x0, 0x1000000000000, 0x0}) 1m25.560181797s ago: executing program 32 (id=83): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x200a, 0x2}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000280)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x10a}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x10, 0x0, &(0x7f0000000900)=[@acquire, @acquire={0x40046305, 0x3}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000680)={0x4c, 0x110000000000000, &(0x7f00000006c0)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x48, 0x18, &(0x7f00000005c0)={@flat=@binder={0x73622a85, 0x1, 0x1}, @flat=@binder={0x73622a85, 0x190b, 0x3}, @fd}, &(0x7f0000000140)={0x0, 0x18, 0x30}}, 0x40}], 0x0, 0x1000000000000, 0x0}) 36.796153284s ago: executing program 1 (id=700): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000b80)=""/227, 0xe3}, {&(0x7f0000001a40)=""/194, 0xc2}, {&(0x7f0000004500)=""/4081, 0xff1}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000000680)=""/122, 0x7a}, {&(0x7f00000004c0)=""/128, 0x80}, {&(0x7f0000000340)=""/263, 0x107}, {&(0x7f0000000140)=""/88, 0x58}], 0x8}, 0xe}, {{0x0, 0x0, 0x0}, 0xffffffff}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, 0x0}, 0xd}, {{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0}, 0x4}], 0x7, 0x40000100, 0x0) 36.778528967s ago: executing program 1 (id=701): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x80040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, 0x0}], 0x1, 0x42, 0x0, 0x0) timer_create(0x3, 0x0, &(0x7f00000000c0)=0x0) r5 = socket$packet(0x11, 0x2, 0x300) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000002280), 0x68c01, 0x0) write$binfmt_format(r7, &(0x7f0000006240)='-1\x00', 0x3) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x112, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'veth0_to_team\x00'}) bind$packet(r5, 0x0, 0x0) timer_gettime(r4, &(0x7f0000000100)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x10, 0x0, 0x0) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r8 = open(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) setns(r8, 0x80) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000080)=0x2) 36.433887994s ago: executing program 1 (id=702): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x143802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x12, r0, 0xe851000) madvise(&(0x7f00000b3000/0x2000)=nil, 0x2000, 0xe) sendmmsg(0xffffffffffffffff, &(0x7f000000efc0)=[{{0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, 0x0, 0xf08}}], 0x1, 0x20040044) ioctl$BLKRRPART(r0, 0x125f, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) (fail_nth: 63) 36.371363305s ago: executing program 1 (id=703): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, 0xffff}, 0x6) (async) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) mount$binderfs(0x0, &(0x7f0000000080)='./binderfs\x00', 0x0, 0x2010860, &(0x7f0000000200)=ANY=[@ANYBLOB="636f6e746578743d7379737465225f75dd47d0b90b893a03"]) (async) r1 = memfd_create(&(0x7f0000000440)='y\x105\xfb\xf7u\x83%\x1f\xe09@:r\xc2\xb9x0\x90P\x03\x00\x00\x00\x00\x00\x00\x00\xfe,\x1c\xf1\xdd\xcf]\xac\xbc\t\xbb\xfc\xa4j\x9f\xceX\x8f5=\xaa\xd5\xe9n\xab s\xa5\x00\x8d\tV\t\x91\x18\x06O\xb0=D\xda\xb6F\x1a\xc82\x8b\xc0l\xd0\x89d\xe6\xb7\xd8\x97\xb8\xde\xa3\x89\xc2%/u\x17\xdaM\x8d\x01Lh\x1e^\x9ej\x1c\xc5\xf0\xf6\x92\x05\x9aH\x00\'\xd4\x94d_\v\xfc\xad\x0f\xa8\xc5\xad\x00\xc2\x12\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\nj\x8c\xef\x90\xc0Z\xfa\x1a\xb3\xf0wVq\xe9d\xf8N\x80\xd1g\xd8e\xc8\x16\xad1\x02\xab\xce3\xb2\xb0\xd1\x11\xf0\xc2Gj+kV$\x80\x8aJ$\x81\xc0\x16\xf5\x9cz\x10\x97\xdb\x12H\xee/\xe3sY\x02D;L~\xd0\xb44\x01*\xfb\xa4 \xb2b\x90H$\xb2\xad\xbf\x8aM\xb6\x81\x81^\x02\xa0\xa7t\xfbHb\xa5=\xdd+$\xc06J\xb4\xf0\xab\x85Xz\x9f\xb2D$\xbe\xd9\x7f-\r\x9aj9r\n_\x11\xd4\x19\xb0\xa0G\xb7\x94\xf7\xfd~\xe9\xb6G\xbfE\xbb\x15\x15\xa6\xca2\xd0\xd3\x8c\xf7nO\xf9\xa8\xfd\x8a\xd2\xb2\xab\xff\xe4\xb0;\xd9\xa8\f\x03R\xbd%\x9fF\xee\x05\x11', 0x2) fcntl$addseals(r1, 0x409, 0x29) (async) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x13, r1, 0x4e650000) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) (async) setxattr$system_posix_acl(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x2}, [], {0x4, 0x1}, [{0x8, 0x1}], {0x10, 0x1}}, 0x2c, 0x3) (async) getxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)=@known='system.posix_acl_access\x00', 0x0, 0xed) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000200)={0xfffa, [0x7, 0x9d0], 0x7f}, 0x10) (async) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x189000, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0xf) (async) ioctl$TCFLSH(r3, 0x400455c8, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f00000023c0)={0x0, 'vlan1\x00', {0xffe}, 0x6}) (async) r5 = socket$tipc(0x1e, 0x2, 0x0) listen(r5, 0x8001) 34.183763411s ago: executing program 1 (id=728): r0 = landlock_create_ruleset(&(0x7f0000000080)={0xc0d8, 0x1, 0x3}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = landlock_create_ruleset(&(0x7f0000000040)={0x0, 0x3}, 0x10, 0x0) landlock_restrict_self(r1, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80ff, 0x88) fcntl$setlease(r2, 0x400, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e22, 0x20, @loopback, 0x23}, 0x1c) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000001500)={0x1, 0x0, 0x0, &(0x7f0000001600)=""/65, 0x0, 0xeeef0000}) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000001a80)={0x2, 0x0, [{0x41000, 0xfb, &(0x7f0000001840)=""/251}, {0x10000, 0x37, &(0x7f00000004c0)=""/55}]}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000400)=""/185, &(0x7f0000000140)=""/79, 0x9000}) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f00000000c0)=0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r4, 0x0, 0x20, &(0x7f00000000c0)="66a75a9eac", 0x5) r5 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r5, &(0x7f0000004580)=[{{&(0x7f0000000a00)={0xa, 0x4e20, 0x7992, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x8}, 0x1c, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="2400000000000000290000003200000000000000000000000000ffff00000000", @ANYRES32=0x0, @ANYBLOB="000000002400000000000000290000003200000000000000000000000000ffffac1414300939"], 0x50}}], 0x1, 0x10) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000040)={@my=0x1}) r6 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r6, &(0x7f0000000200)={0x28, 0x0, 0x0, @host}, 0x10) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=""/57, 0x0, &(0x7f0000000500)=""/4092}) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000240)=0x1) creat(&(0x7f0000000080)='./file0\x00', 0x47) 33.030196324s ago: executing program 1 (id=741): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x60001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) write$tun(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="080086dd0001280004000003a60c6eec00be00442ffffe800000000088fc70738daf7b3200aaff020020000000000000000000000001042022eb"], 0xfdef) 32.433834974s ago: executing program 4 (id=748): r0 = socket(0x4, 0x80000, 0xc) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bridge_slave_0\x00', &(0x7f0000000000)=@ethtool_ringparam={0x10, 0xf351, 0xfffffff4, 0xa, 0x0, 0x5, 0x0, 0x0, 0x2d70}}) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000080)=@ethtool_ts_info}) 32.433354124s ago: executing program 4 (id=749): r0 = syz_usb_connect$hid(0x6, 0x3f, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000000000010d80402f000000000000109022d00010000001009040000010300000009211000fd0122050009058103"], 0x0) keyctl$set_reqkey_keyring(0x10, 0xfffffff8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x303001, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(r3, 0x0, 0x500) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000180)=0x200000, 0x4) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000400)=0x30) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x80, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'erspan0\x00'}) write$tun(r1, &(0x7f0000000100)={@void, @void, @mpls={[{0xff000, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x101}, {0x9}, {0x8}, {0x3, 0x0, 0x1}], @ipv4=@igmp={{0x3c, 0x4, 0x1, 0x4, 0x1ce, 0x66, 0x0, 0x5, 0x2, 0x0, @remote, @private=0xa010101, {[@timestamp={0x44, 0x10, 0x68, 0x0, 0xf, [0x81, 0x7, 0x81]}, @timestamp={0x44, 0x2c, 0xc5, 0x0, 0x0, [0x6, 0x7, 0x8, 0x7, 0xc3f, 0xff, 0x2, 0x2, 0x3, 0x7]}, @end, @noop, @cipso={0x86, 0xf, 0x1, [{0x0, 0x9, "20a910a0751863"}]}, @timestamp_addr={0x44, 0x24, 0x4d, 0x1, 0x9, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffffff9b}, {@private=0xa010100, 0x400}, {@private=0xa010101, 0x4}]}, @cipso={0x86, 0x1b, 0xffffffffffffffff, [{0x2, 0xe, "333c1a3d122bdb8b97697e16"}, {0x6, 0x7, "002e283ca4"}]}, @cipso={0x86, 0x29, 0x3, [{0x6, 0xc, "72476f4b64520cc6f3d3"}, {0x7, 0x8, "257cfbf86cff"}, {0x1, 0xf, "0b42e09c5e5b1d6deca1d4ce2a"}]}, @timestamp_addr={0x44, 0x24, 0x7b, 0x1, 0x9, [{@multicast1, 0xe}, {@loopback, 0x9}, {@loopback, 0x3}, {@loopback, 0x7}]}]}}, {0x14, 0x6, 0x0, @multicast2, "5ddcf444cbc8053ab38dffaab94486725ef82e7ca4fb030db3186f4a32a583e393019322a626986c6c707ceeca0d425d1bbba6653a77bf7d07233066954c7ffd5dc094a9e67974933180380ff0fae274d8aea0d42a0881e1dd74375e1131184640342477c2f0aa0c875cfc369c2b8435f67165d7af0da4204cd2cab94e7cfbd4974fdbb5d3eb2c83c7fa29a2e46d26a4ec958312479eafe9ff698cc489eb4d7039d5306a79a1481bcc188c356b9e246ecf6d3e5a695e96676f2611b7948afb3d17fecf31ddb77df115d095a388a21598194a165022eb"}}}}, 0x1e6) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000040)={0x1, 0x0, [{0xd90, 0x0, 0x8}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000080)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00220540000093fbd16a63"], 0x0}, 0x0) 31.877823027s ago: executing program 4 (id=754): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000b80)=""/227, 0xe3}, {&(0x7f0000001a40)=""/201, 0xc9}, {&(0x7f0000004500)=""/4090, 0xffa}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000000680)=""/122, 0x7a}, {&(0x7f0000002c40)=""/146, 0x92}, {&(0x7f00000004c0)=""/128, 0x80}, {&(0x7f0000000000)=""/260, 0x104}, {&(0x7f0000000140)=""/88, 0x58}], 0x9}, 0xe}, {{0x0, 0x0, 0x0}, 0xd}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xc3}, 0x2}, {{0x0, 0x0, 0x0}, 0xffffffff}, {{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0}, 0x4}], 0x7, 0x40000100, 0x0) 31.875235617s ago: executing program 4 (id=755): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x143802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x12, r0, 0xe851000) madvise(&(0x7f00000b3000/0x2000)=nil, 0x2000, 0xe) sendmmsg(0xffffffffffffffff, &(0x7f000000efc0)=[{{0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, 0x0, 0xf08}}], 0x1, 0x20040044) ioctl$BLKRRPART(r0, 0x125f, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) (fail_nth: 67) 31.837689983s ago: executing program 2 (id=756): r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x143802, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x12, r0, 0xe851000) sendmmsg(0xffffffffffffffff, &(0x7f000000efc0)=[{{0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, 0x0, 0xf08}}], 0x1, 0x20040044) ioctl$BLKRRPART(r0, 0x125f, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x74390) (fail_nth: 75) 29.58615961s ago: executing program 2 (id=757): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x8880, 0x85) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x14, 0x0, &(0x7f0000000300)) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="440000000201010100000000000000000200000004000180180002801400018008000100b04c94a708000200ac1414aa1400198077167d6bcfd4fc6a080002", @ANYBLOB="7469837fdee51472f65042efe4dd290009d281cbb9293f80db8e4057853a26619f8669d8d0d4f3a57b8f71d13547f5219f9587983991be4368c69a77823884145878b62a90c934d7ca29432cd5b16792815cdacca59163291feb1435fcc8b66cf7a22a94cbdd46849ad98135fef4804c0e7fcb8fd5c35dced71078a64458d74cd6b6cc56b86da386a3a19280461109fc54371d299d5e4c1d6b3e4227e7b762ea667f8bd376055a1b8e5875d1a519453690cd037f4003e8f66147511aa45fdb96bb7d770114f795aa1bc649a46653a3784340662bcf2380816e737c79f3af67"], 0x44}}, 0x40041) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r1) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000480)={'ip6tnl0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x4, 0xe0, 0x11, @private1={0xfc, 0x1, '\x00', 0x8}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80, 0x80, 0x6, 0xffff}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000540)={'syztnl1\x00', &(0x7f00000004c0)={'syztnl2\x00', 0x0, 0x2f, 0x24, 0xfc, 0xfbfe, 0x2, @empty, @mcast2, 0x7, 0x80, 0x6, 0x6}}) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) setsockopt$packet_int(r6, 0x107, 0x14, &(0x7f0000000180)=0x19ca, 0x4) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r6, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c153cfdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r7, 0x1, 0x0, 0x6, @multicast}, 0x14) r8 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) bind$can_raw(r8, &(0x7f00000001c0)={0x1d, r9}, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0xb8, r3, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_DEBUG_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_DEBUG_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000895}, 0x40000) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x10, &(0x7f0000000100)=0xc, 0x4) sendmsg$IPCTNL_MSG_CT_GET_STATS(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x5, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0x8}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000) 29.013962856s ago: executing program 0 (id=758): r0 = landlock_create_ruleset(&(0x7f0000000240)={0x20}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002180), 0xa0002, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x44a30c8c58d93834, 0x0, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000180)={0x1, 0x0, [{0x80000001, 0x6, 0x100, 0x8000, 0x7}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) landlock_create_ruleset(&(0x7f0000000240)={0x20}, 0x18, 0x0) (async) landlock_restrict_self(r0, 0x0) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000002180), 0xa0002, 0x0) (async) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) (async) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) (async) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x44a30c8c58d93834, 0x0, 0x0) (async) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000180)={0x1, 0x0, [{0x80000001, 0x6, 0x100, 0x8000, 0x7}]}) (async) ioctl$KVM_RUN(r3, 0xae80, 0x0) (async) 28.976287542s ago: executing program 4 (id=759): capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x42cd, 0x6, 0x7}) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c000000000000110000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x2402c004) 27.596937173s ago: executing program 2 (id=760): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x80040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, 0x0}], 0x1, 0x42, 0x0, 0x0) timer_create(0x3, 0x0, &(0x7f00000000c0)=0x0) r5 = socket$packet(0x11, 0x2, 0x300) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000002280), 0x68c01, 0x0) write$binfmt_format(r7, &(0x7f0000006240)='-1\x00', 0x3) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x112, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000240)={'veth0_to_team\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x0, r8, 0x1, 0x24, 0x6, @broadcast}, 0x14) timer_gettime(r4, &(0x7f0000000100)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x10, 0x0, 0x0) open(0x0, 0x0, 0x0) r9 = open(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) setns(r9, 0x80) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000080)=0x2) 27.192335291s ago: executing program 0 (id=761): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x40, 0x7fff0000}]}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) (async) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x1000000, 0x4) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1c1) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000100)=0xffff, 0x4) (async) writev(r1, &(0x7f0000000cc0)=[{&(0x7f0000000780)="1e", 0x1}], 0x1) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="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", @ANYRESHEX=r5, @ANYBLOB=',debug=0x0000000000000002,afid=0x0000000000000006,k']) 25.805186233s ago: executing program 4 (id=762): io_setup(0x7fff, &(0x7f0000000000)=0x0) r1 = syz_socket_connect_nvme_tcp() r2 = eventfd2(0x7, 0x80800) r3 = syz_open_procfs$pagemap(0x0, &(0x7f0000000180)) r4 = eventfd2(0x4, 0x801) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x10002, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) r7 = syz_open_dev$usbfs(&(0x7f0000000380), 0x1000, 0x30000) r8 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) io_submit(r0, 0x5, &(0x7f0000000600)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f0000000040)="b17877d77634c2beb765396102e771affe1b7d7108393eeb5c10174c5560b0451fe84c37df158561bf6f8b98ee9e4e89b34c0ac9acda42f92736096d7f5cd0e008a7e16d4e5eda52be7ee472bd8defd184e96b7e32d83b7357ab7ab1db408e3a3463a2ef62370d031b64a335148405e7ee19e7ac3bb623c92bca006868ba2fe3bfced54272949a5996bc19087f22c2adb61205e9f1e8341b3f6b11f6abb3ec1ef9739a798a08ec9f3c4008e239d1c96985c813e5211c68c910b6a945ea5b5bc69e3e8853", 0xc4, 0x1, 0x0, 0x0, r2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x6, r3, &(0x7f00000001c0)="e150eff5183ed97e4dc7b4326fe8abd5ae4993b35b748e43954235673b578f8ffde297c77f9805c7a9ebec83d0584421e248d09b6e884bac31b71899a485eacbc6caabb8af5092208423c236cef5509b7158", 0x52, 0xad, 0x0, 0x0, r4}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x6, r5, &(0x7f00000002c0)="7d40bc5e69c126", 0x7, 0xea27, 0x0, 0x1, r6}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x8000, r7, &(0x7f00000003c0)="b9411b25d3c7454733d35b5868ccd6fd747607711fbd74870c8838b9944a1aac0fe1dc8acd26cf39d046469615de94239135a30df523a161b445f4946780eb993d30dcb88053fb2b867985d496956dd3fae927b417b65bbcb32bead89119", 0x5e, 0x7}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x1, r8, &(0x7f00000004c0)="034d29271214f9c8b1dbbd7b8537a84d33d28fc634ef568ec0f3be05a9703aa633b93cf17696d33d71a2d5fd002132bd849db78fb73056beddbf497668f368d64182f8e82a21158a650b486ecc69cc8663d16ca0aab51e503c700f9ea74a92d64123962aaa77c1b08ebc05234dfdd2778fdc3e39578fe2e719e441d34aa760a67f45a9c4f592baddb5f95571d39e28ab9776afdf14cb460517bbfb60879ee451041bb8f5f7e81080fb27aa14c34c911af265148331d7f5c2abea8e994986ef8c80703a5ac2d0bef7d2dac7a06339e2fc349fb6aea2dc612a4ac9033915ac2247c5450be3", 0xe4, 0x10, 0x0, 0x3}]) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000640)={0x101ff, 0x6, 0xb85d3d53025fa6fb, 0x1000, &(0x7f0000fff000/0x1000)=nil}) syz_open_procfs$pagemap(0x0, &(0x7f0000000680)) ioctl$KVM_GET_SUPPORTED_CPUID(r6, 0xc008ae05, &(0x7f00000006c0)={0x4, 0x0, [{0x80000000, 0x6, 0x1, 0x9, 0x7, 0xe1a, 0x8}, {0x80000008, 0x2, 0x1, 0xc6b6, 0x46, 0x10000, 0x4}, {0x80000008, 0x6, 0x2, 0x7, 0x1, 0x6, 0x8}, {0x2, 0x4, 0x5, 0xffffff7f, 0x2, 0x2, 0x8}]}) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r5) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f0000000800)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'syztnl2\x00', 0x0, 0x2f, 0x2, 0xd, 0xa50, 0x24, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x10, 0x80, 0x10, 0x93}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000980)={'ip6tnl0\x00', &(0x7f0000000900)={'syztnl0\x00', 0x0, 0x2f, 0x1, 0x2, 0x0, 0x2, @remote, @mcast1, 0x700, 0x0, 0x3ff, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000ac0)={'syztnl0\x00', &(0x7f00000009c0)={'gretap0\x00', 0x0, 0x40, 0x80, 0x3, 0x1000, {{0x2b, 0x4, 0x1, 0x32, 0xac, 0x68, 0x0, 0x7, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x10}, {[@lsrr={0x83, 0x7, 0x85, [@broadcast]}, @noop, @noop, @ssrr={0x89, 0x17, 0x51, [@loopback, @empty, @loopback, @dev={0xac, 0x14, 0x14, 0x3f}, @rand_addr=0x64010101]}, @ssrr={0x89, 0x1f, 0x36, [@multicast1, @multicast2, @dev={0xac, 0x14, 0x14, 0x37}, @multicast2, @local, @private=0xa010100, @remote]}, @ssrr={0x89, 0x13, 0xda, [@loopback, @multicast2, @loopback, @local]}, @lsrr={0x83, 0x1b, 0xb6, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @local, @remote, @broadcast]}, @timestamp_addr={0x44, 0x1c, 0x41, 0x1, 0x7, [{@local, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@dev={0xac, 0x14, 0x14, 0xb}, 0x1}]}, @timestamp_prespec={0x44, 0xc, 0xf7, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x22}}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000bc0)={'gretap0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x7800, 0x7, 0x1c, 0x8, {{0x1b, 0x4, 0x3, 0x3, 0x6c, 0x68, 0x0, 0x7, 0x2f, 0x0, @multicast1, @private=0xa010102, {[@cipso={0x86, 0x20, 0x0, [{0x1, 0x12, "5265cd5592c374389c5a699c8411560d"}, {0x2, 0x6, "11044aeb"}, {0x5, 0x2}]}, @ra={0x94, 0x4, 0x1}, @generic={0x82, 0x11, "4b49d717d8fbf2dc3f33836e589045"}, @cipso={0x86, 0x1a, 0xffffffffffffffff, [{0x1, 0x9, "1a76dd7a5a1f52"}, {0x1, 0xb, "39a441dc948216b7af"}]}, @generic={0xd1, 0x7, "9e34051825"}]}}}}}) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000c00)={0x0, @initdev, @local}, &(0x7f0000000c40)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000d00)={'ip6gre0\x00', &(0x7f0000000c80)={'ip6tnl0\x00', 0x0, 0x29, 0xf8, 0x3e, 0x10001, 0x9, @private1, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x8000, 0x10, 0x2, 0xffffffff}}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000d40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000e00)={'gre0\x00', &(0x7f0000000d80)={'syztnl1\x00', 0x0, 0x80, 0x20, 0x9, 0x8, {{0xc, 0x4, 0x2, 0x1, 0x30, 0x68, 0x0, 0x9f, 0x4, 0x0, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x1c, 0x8d, 0x1, 0x1, [{@remote, 0x7ff}, {@rand_addr=0x64010101, 0x3}, {@remote, 0x37}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r8, 0x89f3, &(0x7f0000000ec0)={'syztnl1\x00', &(0x7f0000000e40)={'ip6tnl0\x00', 0x0, 0x29, 0x66, 0x2, 0x13, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x20, 0x20, 0x5, 0x4}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000f00)={'batadv0\x00', 0x0}) getsockname$packet(r8, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000f80)=0x14) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000fc0)={@local, @empty, 0x0}, &(0x7f0000001000)=0xc) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r6, &(0x7f0000001280)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001040)={0x1cc, r9, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r18}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r19}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r20}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r21}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r22}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x44}, 0x48000) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r5, &(0x7f0000001540)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001500)={&(0x7f0000001300)={0x200, r9, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r22}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r22}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000001580)) 24.68660401s ago: executing program 0 (id=763): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000300)=""/275, 0x113}], 0x1, 0xa3, 0xf9f) (async) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYRES8=r0], 0x0) (async) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000380)={'team_slave_0\x00', &(0x7f0000000200)=@ethtool_sset_info={0x18, 0x0, 0x101}}) (async) syz_usb_control_io$hid(r1, 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000240)={'wg2\x00', &(0x7f0000000280)=@ethtool_cmd={0x1c, 0x10000000, 0xa, 0x6, 0x2, 0x7, 0x7f, 0x8, 0x7, 0x10, 0x9, 0x0, 0x5, 0xc, 0x5, 0x7, [0x1, 0x4]}}) syz_usb_control_io(r1, &(0x7f0000000400)={0x18, &(0x7f0000000940)=ANY=[@ANYBLOB='\x000\b'], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r4, 0xc018620c, 0x0) (async, rerun: 32) syz_usb_control_io$hid(r1, 0x0, &(0x7f0000000600)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2001030000000f39bed69530ea280ac22de5bbb1a2535f"], 0x0}) (async, rerun: 32) syz_usb_connect(0x2, 0x34, &(0x7f0000000080)=ANY=[@ANYBLOB="1201000094ba78084e080110aeed010203010902220001000000000904000001437b6a000905000000130000000705", @ANYRES8], 0x0) (async) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup(r5) ioctl$PTP_EXTTS_REQUEST2(r6, 0x40043d14, &(0x7f0000000040)) (async) syz_usb_control_io$hid(r1, 0x0, 0x0) (async, rerun: 32) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x0, 0x8, 0x0, 0x0, 0x400000, 0xfffffffd}) (async, rerun: 32) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[], 0x64}}, 0x0) (async) r7 = epoll_create1(0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40088a01, &(0x7f0000000000)=0x20000000) syz_usb_control_io(r1, 0x0, &(0x7f0000000780)={0x84, &(0x7f0000000340)={0x40, 0x14, 0xd, "37e44d8944ebcd9e2d74b0eabd"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 24.513863899s ago: executing program 2 (id=764): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000b80)=""/227, 0xe3}, {&(0x7f0000001a40)=""/201, 0xc9}, {&(0x7f0000004500)=""/4090, 0xffa}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000000680)=""/122, 0x7a}, {&(0x7f0000002c40)=""/146, 0x92}, {&(0x7f00000004c0)=""/128, 0x80}, {&(0x7f0000000000)=""/260, 0x104}, {&(0x7f0000000140)=""/88, 0x58}], 0x9}, 0xe}, {{0x0, 0x0, 0x0}, 0xd}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2}, {{0x0, 0x0, 0x0}, 0xffffffff}, {{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0}, 0x4}], 0x7, 0x40000100, 0x0) 23.086453848s ago: executing program 0 (id=765): r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="140000000000000000000000070000004404fc5c000000001c000000000000003fca79dee88f53a1", @ANYRES32=0x0, @ANYBLOB="ac141412ac1e000100000000"], 0x38}, 0x4000004) 22.665362568s ago: executing program 2 (id=766): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x2003, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000080)=0x14) (async) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = fsopen(&(0x7f0000000140)='cgroup2\x00', 0x0) keyctl$setperm(0x5, 0x0, 0x30925) (async, rerun: 32) keyctl$join(0x1, 0x0) (async, rerun: 32) fstat(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, r4) (async) syz_create_resource$binfmt(&(0x7f00000001c0)='./file0\x00') sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="020d000014000000000000000000000005000500000000000a00000000000000f65e01905361"], 0xa0}}, 0x0) (async, rerun: 32) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000cc0)={'syz1\x00', {0xfff9, 0x2, 0x248, 0x9b99}, 0x47, [0xfffffff8, 0x1, 0x5, 0x9, 0x10008, 0x155f, 0x6, 0x4, 0x25cd, 0x1, 0xb4, 0xa, 0xa2b9, 0x6, 0x7, 0xe4, 0x6, 0xfc000000, 0x3, 0xbbd, 0x4a732f64, 0x1, 0x1000, 0xd, 0x6, 0xb87, 0x6, 0xfffffffd, 0x2, 0x6, 0x7, 0x8, 0x9, 0x79, 0x25713dc3, 0x10000, 0x0, 0x7, 0x4, 0x4, 0x16, 0x2, 0x5, 0x401, 0xfffffff5, 0x405, 0xa7, 0x81, 0x9, 0xf9a2, 0x80000001, 0xff, 0x0, 0x2, 0x2, 0xa, 0x1000, 0xef1, 0x7ff, 0x4, 0x4007f, 0xffffffff, 0x9, 0x6], [0x9, 0x3, 0x6, 0x9, 0x8, 0xc66, 0xa8a9, 0x2000006f, 0x8e, 0xd50, 0x9, 0x5, 0x2, 0x809, 0x0, 0xa7, 0x1000, 0x2000, 0x400, 0x400000, 0x0, 0x4, 0x1c, 0x7, 0x1, 0x2, 0x3, 0x8, 0xffffff7f, 0x400, 0x6, 0x4c2336d3, 0x4, 0x0, 0xfffffff8, 0x0, 0x7, 0xf1, 0x4, 0x1, 0xfffd, 0x7, 0x2, 0x5, 0x3ff, 0x1ff, 0x1, 0x7fff, 0x1, 0x1cb, 0x1, 0x80000002, 0x3, 0x438, 0x2, 0x9, 0x95, 0x7ffffffb, 0x4, 0xfffffff9, 0x7f, 0x1000, 0xfffff801, 0x5], [0xffdffffe, 0xf2, 0xffff, 0xc, 0xfff, 0x2e6bf786, 0x80000001, 0x5, 0x5, 0x491, 0x8d3, 0x200006, 0x8, 0x400, 0x2, 0x400, 0x41, 0x6, 0xee4b, 0x2000004, 0x1, 0x8000003, 0x5, 0x9, 0xb834, 0x3, 0x9, 0x3, 0xc7, 0xfff, 0x100009, 0x8000, 0x400, 0x3e55, 0x5, 0xd3, 0x408, 0x3437, 0x3, 0xd, 0x7, 0x601, 0x101, 0xdd80, 0x60a0, 0x7f, 0x9d26, 0x10000, 0x1, 0x2, 0x2, 0x6, 0x8000, 0x4, 0x3, 0xd500, 0x8, 0x77, 0x9, 0x6, 0x10000, 0xfffffffd, 0x8, 0x1], [0xa772, 0x6, 0x5, 0x1afa, 0x40bfc, 0x8, 0x5, 0x7f, 0x2a29, 0x43, 0xff, 0x1005, 0x5, 0x7, 0x1e, 0x9, 0x81, 0x1, 0x10001, 0xd, 0xfffffff7, 0x8, 0x6, 0x5396, 0x3, 0x200006, 0x80008001, 0x7777, 0x1, 0x2, 0x100, 0x8, 0x400, 0x9, 0xe, 0x32d, 0x3, 0x201, 0x2000803, 0xffffffff, 0x10000, 0x0, 0x8008, 0x7fff, 0x3, 0x6, 0xf, 0xe, 0x5337, 0x26d, 0x6, 0xfffffffc, 0x4, 0xfffffff9, 0x9, 0x4, 0x463f, 0x4, 0xdab, 0x3, 0x1, 0x14000, 0x1, 0x9]}, 0x45c) (async, rerun: 32) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) (async) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000000)={[0x35, 0xfff, 0x0, 0x40000000000180, 0x2, 0x80000000, 0xf2, 0xd, 0x7fffffffffffe, 0x7, 0x5, 0x7, 0x0, 0x5, 0x4, 0x8], 0x25000, 0x304}) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$KVM_RUN(r8, 0xae80, 0x0) (async) r9 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r10 = dup(r9) (async, rerun: 32) ioctl$KVM_SET_USER_MEMORY_REGION(r9, 0x4020ae46, &(0x7f0000000840)={0x1fe, 0x2, 0x3000, 0x2000, &(0x7f0000003000/0x2000)=nil}) (rerun: 32) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r11, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="c20000361e0f01c3660fd2eff30f10f1b961020000b80e000000ba000000000f30b98d0200000f320b99f3530000660f6af7c4e2f91d20", 0x37}], 0x1, 0x11, 0x0, 0x0) syz_kvm_setup_cpu$x86(r9, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) (async) ioctl$KVM_RUN(r11, 0xae80, 0x0) socket$packet(0x11, 0x3, 0x300) 22.000435429s ago: executing program 0 (id=767): r0 = creat(&(0x7f0000000080)='./file0\x00', 0x6a) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) fadvise64(r1, 0x8a, 0xd, 0x2) (async, rerun: 64) r2 = socket(0x1e, 0x4, 0x0) (rerun: 64) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x8, 0x0, 0xc}, 0x10) (async) r3 = socket(0x1e, 0x4, 0x0) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)={0x24, r5, 0x201, 0x3ffffd, 0x800000, {{}, {}, {0x8, 0x11, 0x84e}}}, 0x24}, 0x1, 0x0, 0x0, 0x11}, 0x20040010) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) (async) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r6, 0xffffffffffffffff, 0x0) close(r0) (async) socket$tipc(0x1e, 0x4, 0x0) (async) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 21.146515962s ago: executing program 2 (id=768): socket$packet(0x11, 0x3, 0x300) (async, rerun: 32) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000080)={'syz1\x00', {0x4001, 0xe, 0x5, 0xe4fa}, 0x2, [0x2, 0x9, 0x3, 0x7, 0x7, 0x8, 0x0, 0x5, 0x3, 0x3, 0x101, 0x400, 0x81, 0x7, 0x6, 0x3, 0xe, 0x875, 0x6, 0x6, 0x3, 0x6, 0xb, 0x7, 0x4, 0x7ff, 0xa0, 0x80000000, 0x0, 0xfffffffc, 0xea16, 0x7, 0x11fe, 0x2, 0x642, 0x7, 0x1, 0xbe, 0x31, 0x407c1912, 0x18000000, 0x6, 0xedb1, 0x7, 0x7, 0x1, 0xd7e, 0xffffff36, 0x3, 0x7fffffff, 0xa, 0xffffffff, 0x92, 0xb7, 0x2, 0x7fffffff, 0x9, 0x6, 0x6, 0x3, 0x10000, 0x6, 0x7, 0xf19], [0x27, 0x0, 0x6, 0x9, 0x7, 0x2e6bbd38, 0x1, 0x0, 0x4, 0x7, 0x2, 0x8, 0xf22, 0x7230, 0x9, 0x0, 0xa8b, 0x36, 0x101, 0xa, 0x400, 0x8000, 0x8, 0xffff, 0xe, 0x3, 0x1000, 0xfffffd23, 0x4e, 0x5, 0x10001, 0x1, 0x7, 0x8, 0x5, 0x6808, 0x5, 0x5, 0x58ffede2, 0xdef, 0x7, 0x5, 0x1, 0x3, 0x18, 0xa9, 0x60c2, 0x0, 0xd5, 0xee6, 0x1, 0x5, 0x80000000, 0x0, 0x1, 0xf, 0x2, 0x80003e, 0xc436, 0x0, 0x5, 0xdd, 0x4, 0x100], [0x5, 0x8, 0x5, 0x0, 0x9, 0x2, 0x7, 0x6, 0x4, 0x0, 0xffffffff, 0xff, 0xfffffffc, 0xfe, 0xa373, 0xf7, 0x9, 0x6, 0x1, 0x8, 0x9, 0x1000003, 0x2, 0x4, 0x4e, 0x8000, 0x46, 0x4, 0x7, 0x0, 0x64, 0x80000000, 0x5, 0xa48, 0x7, 0x200, 0x4, 0xfffffffd, 0x7fff, 0x3, 0x2, 0xb, 0x9, 0xffffffff, 0x0, 0x2, 0x2e, 0x1000, 0x3, 0xec35, 0x0, 0x2e81, 0xfffffffe, 0x5, 0x4, 0x9, 0x81, 0xee7, 0x6, 0x7, 0x5, 0x9, 0x3, 0x8], [0x1ff, 0x2, 0x5, 0x8, 0x6, 0x5, 0xe00000, 0x800, 0xc1, 0x6, 0x4, 0x1, 0x5, 0x9, 0x9b, 0x6, 0xfffff801, 0xfffffff6, 0x4, 0xfffff49d, 0x4, 0x0, 0x100, 0x9, 0x9, 0x2, 0x5db8, 0x0, 0x6, 0xe, 0x2, 0x6, 0x5, 0x9, 0x5, 0x2f4, 0x9, 0x4, 0xffff0000, 0x7, 0x1, 0xdc7a, 0xe8, 0x8, 0x42000, 0x9, 0x2, 0xb, 0x1, 0xa, 0x6, 0x0, 0x6, 0x6, 0x80000001, 0x2, 0x9, 0x34, 0x6, 0xfffffffe, 0x6, 0xae, 0x1, 0x9]}, 0x45c) (async, rerun: 32) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x7002}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000600)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async, rerun: 64) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) (async, rerun: 64) pread64(r0, &(0x7f0000002200)=""/87, 0x57, 0xfffd) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a6c000000060a0b04000000000000000002000000400004803c0001800b00010065"], 0x94}}, 0x0) (async) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01060000000000000000090000002c0004801300010062726f6164636173742d6c696e6b0000140007"], 0x40}, 0x1, 0x0, 0x0, 0x2400c005}, 0x0) r4 = socket(0x11, 0xa, 0x5) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'ipvlan0\x00', {0x2, 0x4e20, @broadcast}}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) (async) sendto$inet(r4, &(0x7f0000000100), 0x5ee, 0x800, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) 20.532804675s ago: executing program 0 (id=769): mlockall(0x7) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') (async) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') r1 = memfd_create(&(0x7f0000000240)='v\xa6\xf5lj6,r\xaf\xe8\x10/\xecg\xed\xe3h\x80\xb8!y6w\xda\xdd\xb9\nR\xe8@\x99\xb9\x8a\x0fZ\t\x90\x8bp\x10\x84\x86t\x8a\xba\xc6\xfb\xd2\f\xef&\xad\xa8M\xe8\b\xb0#\xac)\x81\x1e\x8a\f\x11D\xe3l\x87\\\x15Hd~\\\x11\x95\xf8\xe6\xa7\xc3\xbc\x18+\x92\x92N\a\xa7\x7fN\x9bL\xf8\xebQs\x02\xf9\xadi\x8f\x0f\xff\x02n\x9d\x85\xea\x1a*\x1bI\xd8\x1c\xe8\x9bYS%\x1d\x10\x86\xa0\v\xea\xd9\x89\xda\xa7Wd\xa4Eu\x8csm\xa1.\xd1\xb2I\x1a\x0e\b$\x16\xb2\xfdA\x98\x16\xca\x83y\xf9\x1a\xe7\x06h\av\xa8\xd8\xceY\xc0\xe6v\xb5\xf5\x9d\xbe\xa58\xb42\xd8V$\xe6\xc8\x1c\xaf\x8e\xa1\xefa\xb1/\xee1=\xbfM\xeaw\f\xa2\x87\x1c(\x1a-\xeb\xfbV\xeb4\xd4C]\xc7{t\xf9\xd5`IZ\x03H\xd9\x86\xe12N\x1f\xd8{\xf5z@\xe0', 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000180)={0xfffffffffffffffd, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0xcc, 0x3, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TUPLE_REPLY={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x39}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_NAT_SRC={0x28, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x12}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0x64010102}, @CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x1}]}, 0xcc}}, 0x8010) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) (async) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000640)={0x2020}, 0x2020) 17.843098805s ago: executing program 33 (id=741): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x60001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) write$tun(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="080086dd0001280004000003a60c6eec00be00442ffffe800000000088fc70738daf7b3200aaff020020000000000000000000000001042022eb"], 0xfdef) 2.297402325s ago: executing program 34 (id=769): mlockall(0x7) syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') (async) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') r1 = memfd_create(&(0x7f0000000240)='v\xa6\xf5lj6,r\xaf\xe8\x10/\xecg\xed\xe3h\x80\xb8!y6w\xda\xdd\xb9\nR\xe8@\x99\xb9\x8a\x0fZ\t\x90\x8bp\x10\x84\x86t\x8a\xba\xc6\xfb\xd2\f\xef&\xad\xa8M\xe8\b\xb0#\xac)\x81\x1e\x8a\f\x11D\xe3l\x87\\\x15Hd~\\\x11\x95\xf8\xe6\xa7\xc3\xbc\x18+\x92\x92N\a\xa7\x7fN\x9bL\xf8\xebQs\x02\xf9\xadi\x8f\x0f\xff\x02n\x9d\x85\xea\x1a*\x1bI\xd8\x1c\xe8\x9bYS%\x1d\x10\x86\xa0\v\xea\xd9\x89\xda\xa7Wd\xa4Eu\x8csm\xa1.\xd1\xb2I\x1a\x0e\b$\x16\xb2\xfdA\x98\x16\xca\x83y\xf9\x1a\xe7\x06h\av\xa8\xd8\xceY\xc0\xe6v\xb5\xf5\x9d\xbe\xa58\xb42\xd8V$\xe6\xc8\x1c\xaf\x8e\xa1\xefa\xb1/\xee1=\xbfM\xeaw\f\xa2\x87\x1c(\x1a-\xeb\xfbV\xeb4\xd4C]\xc7{t\xf9\xd5`IZ\x03H\xd9\x86\xe12N\x1f\xd8{\xf5z@\xe0', 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000180)={0xfffffffffffffffd, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0xcc, 0x3, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_TUPLE_REPLY={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x39}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_NAT_SRC={0x28, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x12}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0x64010102}, @CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x1}]}, 0xcc}}, 0x8010) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) (async) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) read$FUSE(r0, &(0x7f0000000640)={0x2020}, 0x2020) 774.30655ms ago: executing program 35 (id=768): socket$packet(0x11, 0x3, 0x300) (async, rerun: 32) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000080)={'syz1\x00', {0x4001, 0xe, 0x5, 0xe4fa}, 0x2, [0x2, 0x9, 0x3, 0x7, 0x7, 0x8, 0x0, 0x5, 0x3, 0x3, 0x101, 0x400, 0x81, 0x7, 0x6, 0x3, 0xe, 0x875, 0x6, 0x6, 0x3, 0x6, 0xb, 0x7, 0x4, 0x7ff, 0xa0, 0x80000000, 0x0, 0xfffffffc, 0xea16, 0x7, 0x11fe, 0x2, 0x642, 0x7, 0x1, 0xbe, 0x31, 0x407c1912, 0x18000000, 0x6, 0xedb1, 0x7, 0x7, 0x1, 0xd7e, 0xffffff36, 0x3, 0x7fffffff, 0xa, 0xffffffff, 0x92, 0xb7, 0x2, 0x7fffffff, 0x9, 0x6, 0x6, 0x3, 0x10000, 0x6, 0x7, 0xf19], [0x27, 0x0, 0x6, 0x9, 0x7, 0x2e6bbd38, 0x1, 0x0, 0x4, 0x7, 0x2, 0x8, 0xf22, 0x7230, 0x9, 0x0, 0xa8b, 0x36, 0x101, 0xa, 0x400, 0x8000, 0x8, 0xffff, 0xe, 0x3, 0x1000, 0xfffffd23, 0x4e, 0x5, 0x10001, 0x1, 0x7, 0x8, 0x5, 0x6808, 0x5, 0x5, 0x58ffede2, 0xdef, 0x7, 0x5, 0x1, 0x3, 0x18, 0xa9, 0x60c2, 0x0, 0xd5, 0xee6, 0x1, 0x5, 0x80000000, 0x0, 0x1, 0xf, 0x2, 0x80003e, 0xc436, 0x0, 0x5, 0xdd, 0x4, 0x100], [0x5, 0x8, 0x5, 0x0, 0x9, 0x2, 0x7, 0x6, 0x4, 0x0, 0xffffffff, 0xff, 0xfffffffc, 0xfe, 0xa373, 0xf7, 0x9, 0x6, 0x1, 0x8, 0x9, 0x1000003, 0x2, 0x4, 0x4e, 0x8000, 0x46, 0x4, 0x7, 0x0, 0x64, 0x80000000, 0x5, 0xa48, 0x7, 0x200, 0x4, 0xfffffffd, 0x7fff, 0x3, 0x2, 0xb, 0x9, 0xffffffff, 0x0, 0x2, 0x2e, 0x1000, 0x3, 0xec35, 0x0, 0x2e81, 0xfffffffe, 0x5, 0x4, 0x9, 0x81, 0xee7, 0x6, 0x7, 0x5, 0x9, 0x3, 0x8], [0x1ff, 0x2, 0x5, 0x8, 0x6, 0x5, 0xe00000, 0x800, 0xc1, 0x6, 0x4, 0x1, 0x5, 0x9, 0x9b, 0x6, 0xfffff801, 0xfffffff6, 0x4, 0xfffff49d, 0x4, 0x0, 0x100, 0x9, 0x9, 0x2, 0x5db8, 0x0, 0x6, 0xe, 0x2, 0x6, 0x5, 0x9, 0x5, 0x2f4, 0x9, 0x4, 0xffff0000, 0x7, 0x1, 0xdc7a, 0xe8, 0x8, 0x42000, 0x9, 0x2, 0xb, 0x1, 0xa, 0x6, 0x0, 0x6, 0x6, 0x80000001, 0x2, 0x9, 0x34, 0x6, 0xfffffffe, 0x6, 0xae, 0x1, 0x9]}, 0x45c) (async, rerun: 32) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x7002}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000600)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async, rerun: 64) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) (async, rerun: 64) pread64(r0, &(0x7f0000002200)=""/87, 0x57, 0xfffd) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a6c000000060a0b04000000000000000002000000400004803c0001800b00010065"], 0x94}}, 0x0) (async) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01060000000000000000090000002c0004801300010062726f6164636173742d6c696e6b0000140007"], 0x40}, 0x1, 0x0, 0x0, 0x2400c005}, 0x0) r4 = socket(0x11, 0xa, 0x5) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'ipvlan0\x00', {0x2, 0x4e20, @broadcast}}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) (async) sendto$inet(r4, &(0x7f0000000100), 0x5ee, 0x800, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) 0s ago: executing program 36 (id=762): io_setup(0x7fff, &(0x7f0000000000)=0x0) r1 = syz_socket_connect_nvme_tcp() r2 = eventfd2(0x7, 0x80800) r3 = syz_open_procfs$pagemap(0x0, &(0x7f0000000180)) r4 = eventfd2(0x4, 0x801) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x10002, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) r7 = syz_open_dev$usbfs(&(0x7f0000000380), 0x1000, 0x30000) r8 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) io_submit(r0, 0x5, &(0x7f0000000600)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f0000000040)="b17877d77634c2beb765396102e771affe1b7d7108393eeb5c10174c5560b0451fe84c37df158561bf6f8b98ee9e4e89b34c0ac9acda42f92736096d7f5cd0e008a7e16d4e5eda52be7ee472bd8defd184e96b7e32d83b7357ab7ab1db408e3a3463a2ef62370d031b64a335148405e7ee19e7ac3bb623c92bca006868ba2fe3bfced54272949a5996bc19087f22c2adb61205e9f1e8341b3f6b11f6abb3ec1ef9739a798a08ec9f3c4008e239d1c96985c813e5211c68c910b6a945ea5b5bc69e3e8853", 0xc4, 0x1, 0x0, 0x0, r2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x6, r3, &(0x7f00000001c0)="e150eff5183ed97e4dc7b4326fe8abd5ae4993b35b748e43954235673b578f8ffde297c77f9805c7a9ebec83d0584421e248d09b6e884bac31b71899a485eacbc6caabb8af5092208423c236cef5509b7158", 0x52, 0xad, 0x0, 0x0, r4}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x6, r5, &(0x7f00000002c0)="7d40bc5e69c126", 0x7, 0xea27, 0x0, 0x1, r6}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x8000, r7, &(0x7f00000003c0)="b9411b25d3c7454733d35b5868ccd6fd747607711fbd74870c8838b9944a1aac0fe1dc8acd26cf39d046469615de94239135a30df523a161b445f4946780eb993d30dcb88053fb2b867985d496956dd3fae927b417b65bbcb32bead89119", 0x5e, 0x7}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x6, 0x1, r8, &(0x7f00000004c0)="034d29271214f9c8b1dbbd7b8537a84d33d28fc634ef568ec0f3be05a9703aa633b93cf17696d33d71a2d5fd002132bd849db78fb73056beddbf497668f368d64182f8e82a21158a650b486ecc69cc8663d16ca0aab51e503c700f9ea74a92d64123962aaa77c1b08ebc05234dfdd2778fdc3e39578fe2e719e441d34aa760a67f45a9c4f592baddb5f95571d39e28ab9776afdf14cb460517bbfb60879ee451041bb8f5f7e81080fb27aa14c34c911af265148331d7f5c2abea8e994986ef8c80703a5ac2d0bef7d2dac7a06339e2fc349fb6aea2dc612a4ac9033915ac2247c5450be3", 0xe4, 0x10, 0x0, 0x3}]) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000640)={0x101ff, 0x6, 0xb85d3d53025fa6fb, 0x1000, &(0x7f0000fff000/0x1000)=nil}) syz_open_procfs$pagemap(0x0, &(0x7f0000000680)) ioctl$KVM_GET_SUPPORTED_CPUID(r6, 0xc008ae05, &(0x7f00000006c0)={0x4, 0x0, [{0x80000000, 0x6, 0x1, 0x9, 0x7, 0xe1a, 0x8}, {0x80000008, 0x2, 0x1, 0xc6b6, 0x46, 0x10000, 0x4}, {0x80000008, 0x6, 0x2, 0x7, 0x1, 0x6, 0x8}, {0x2, 0x4, 0x5, 0xffffff7f, 0x2, 0x2, 0x8}]}) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000007c0), r5) ioctl$ifreq_SIOCGIFINDEX_wireguard(r8, 0x8933, &(0x7f0000000800)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000840)={'syztnl2\x00', 0x0, 0x2f, 0x2, 0xd, 0xa50, 0x24, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x10, 0x80, 0x10, 0x93}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000980)={'ip6tnl0\x00', &(0x7f0000000900)={'syztnl0\x00', 0x0, 0x2f, 0x1, 0x2, 0x0, 0x2, @remote, @mcast1, 0x700, 0x0, 0x3ff, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000ac0)={'syztnl0\x00', &(0x7f00000009c0)={'gretap0\x00', 0x0, 0x40, 0x80, 0x3, 0x1000, {{0x2b, 0x4, 0x1, 0x32, 0xac, 0x68, 0x0, 0x7, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x30}, @dev={0xac, 0x14, 0x14, 0x10}, {[@lsrr={0x83, 0x7, 0x85, [@broadcast]}, @noop, @noop, @ssrr={0x89, 0x17, 0x51, [@loopback, @empty, @loopback, @dev={0xac, 0x14, 0x14, 0x3f}, @rand_addr=0x64010101]}, @ssrr={0x89, 0x1f, 0x36, [@multicast1, @multicast2, @dev={0xac, 0x14, 0x14, 0x37}, @multicast2, @local, @private=0xa010100, @remote]}, @ssrr={0x89, 0x13, 0xda, [@loopback, @multicast2, @loopback, @local]}, @lsrr={0x83, 0x1b, 0xb6, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @local, @remote, @broadcast]}, @timestamp_addr={0x44, 0x1c, 0x41, 0x1, 0x7, [{@local, 0xfff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@dev={0xac, 0x14, 0x14, 0xb}, 0x1}]}, @timestamp_prespec={0x44, 0xc, 0xf7, 0x3, 0x0, [{@dev={0xac, 0x14, 0x14, 0x22}}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000bc0)={'gretap0\x00', &(0x7f0000000b00)={'syztnl1\x00', 0x0, 0x7800, 0x7, 0x1c, 0x8, {{0x1b, 0x4, 0x3, 0x3, 0x6c, 0x68, 0x0, 0x7, 0x2f, 0x0, @multicast1, @private=0xa010102, {[@cipso={0x86, 0x20, 0x0, [{0x1, 0x12, "5265cd5592c374389c5a699c8411560d"}, {0x2, 0x6, "11044aeb"}, {0x5, 0x2}]}, @ra={0x94, 0x4, 0x1}, @generic={0x82, 0x11, "4b49d717d8fbf2dc3f33836e589045"}, @cipso={0x86, 0x1a, 0xffffffffffffffff, [{0x1, 0x9, "1a76dd7a5a1f52"}, {0x1, 0xb, "39a441dc948216b7af"}]}, @generic={0xd1, 0x7, "9e34051825"}]}}}}}) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000c00)={0x0, @initdev, @local}, &(0x7f0000000c40)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000d00)={'ip6gre0\x00', &(0x7f0000000c80)={'ip6tnl0\x00', 0x0, 0x29, 0xf8, 0x3e, 0x10001, 0x9, @private1, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x8000, 0x10, 0x2, 0xffffffff}}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000d40)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000e00)={'gre0\x00', &(0x7f0000000d80)={'syztnl1\x00', 0x0, 0x80, 0x20, 0x9, 0x8, {{0xc, 0x4, 0x2, 0x1, 0x30, 0x68, 0x0, 0x9f, 0x4, 0x0, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_addr={0x44, 0x1c, 0x8d, 0x1, 0x1, [{@remote, 0x7ff}, {@rand_addr=0x64010101, 0x3}, {@remote, 0x37}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r8, 0x89f3, &(0x7f0000000ec0)={'syztnl1\x00', &(0x7f0000000e40)={'ip6tnl0\x00', 0x0, 0x29, 0x66, 0x2, 0x13, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x20, 0x20, 0x5, 0x4}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000f00)={'batadv0\x00', 0x0}) getsockname$packet(r8, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000f80)=0x14) getsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000fc0)={@local, @empty, 0x0}, &(0x7f0000001000)=0xc) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r6, &(0x7f0000001280)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001040)={0x1cc, r9, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r18}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r19}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r20}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r21}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r22}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x44}, 0x48000) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r5, &(0x7f0000001540)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001500)={&(0x7f0000001300)={0x200, r9, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r22}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r22}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r17}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}]}, 0x200}, 0x1, 0x0, 0x0, 0x4000}, 0x4) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000001580)) kernel console output (not intermixed with test programs): D: 1546 Comm: syz.0.503 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 74.453919][ T1546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 74.453935][ T1546] Call Trace: [ 74.453943][ T1546] [ 74.453953][ T1546] __dump_stack+0x21/0x30 [ 74.453990][ T1546] dump_stack_lvl+0x140/0x1c0 [ 74.454021][ T1546] ? __cfi_dump_stack_lvl+0x10/0x10 [ 74.454053][ T1546] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 74.454083][ T1546] dump_stack+0x19/0x20 [ 74.454112][ T1546] should_fail_ex+0x3d7/0x530 [ 74.454144][ T1546] should_fail_alloc_page+0xec/0x110 [ 74.454169][ T1546] __alloc_pages_noprof+0x1c0/0x7e0 [ 74.454197][ T1546] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 74.454230][ T1546] __folio_alloc_noprof+0x14/0x80 [ 74.454259][ T1546] folio_prealloc+0x46/0x220 [ 74.454284][ T1546] do_pte_missing+0x169c/0x4410 [ 74.454308][ T1546] ? mlock_folio+0x25d/0x330 [ 74.454337][ T1546] ? cgroup_rstat_updated+0x141/0x810 [ 74.454360][ T1546] ? pte_marker_clear+0x1b0/0x1b0 [ 74.454385][ T1546] ? lru_gen_update_size+0x572/0x630 [ 74.454412][ T1546] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 74.454436][ T1546] ? __pte_offset_map+0x1b0/0x230 [ 74.454466][ T1546] ? pte_offset_map_rw_nolock+0xba/0x110 [ 74.454497][ T1546] handle_mm_fault+0x11b8/0x1bf0 [ 74.454518][ T1546] ? __kasan_check_write+0x18/0x20 [ 74.454554][ T1546] ? __cfi_handle_mm_fault+0x10/0x10 [ 74.454584][ T1546] ? follow_page_pte+0x4b9/0xbc0 [ 74.454612][ T1546] ? gup_must_unshare+0x1e0/0x1e0 [ 74.454639][ T1546] ? vma_is_secretmem+0x11/0x50 [ 74.454668][ T1546] __get_user_pages+0x1170/0x22b0 [ 74.454699][ T1546] ? populate_vma_page_range+0x220/0x220 [ 74.454724][ T1546] ? down_read+0x7f/0xe0 [ 74.454752][ T1546] ? __cfi_down_read+0x10/0x10 [ 74.454782][ T1546] __mm_populate+0x2f8/0x430 [ 74.454807][ T1546] do_mlock+0x7eb/0xa00 [ 74.454835][ T1546] ? fput+0x1a4/0x240 [ 74.454859][ T1546] ? lru_gen_add_folio+0x860/0x860 [ 74.454887][ T1546] ? ksys_write+0x1f3/0x260 [ 74.454920][ T1546] ? __cfi_ksys_write+0x10/0x10 [ 74.454953][ T1546] ? __kasan_check_read+0x15/0x20 [ 74.454985][ T1546] __x64_sys_mlock+0x64/0x80 [ 74.455011][ T1546] x64_sys_call+0x670/0x2ee0 [ 74.455045][ T1546] do_syscall_64+0x57/0xf0 [ 74.455079][ T1546] ? clear_bhb_loop+0x50/0xa0 [ 74.455103][ T1546] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 74.455139][ T1546] RIP: 0033:0x7f46e039c819 [ 74.455160][ T1546] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 74.455181][ T1546] RSP: 002b:00007f46dedf7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 74.455208][ T1546] RAX: ffffffffffffffda RBX: 00007f46e0615fa0 RCX: 00007f46e039c819 [ 74.455227][ T1546] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 74.455243][ T1546] RBP: 00007f46dedf7090 R08: 0000000000000000 R09: 0000000000000000 [ 74.455259][ T1546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 74.455274][ T1546] R13: 00007f46e0616038 R14: 00007f46e0615fa0 R15: 00007ffd0a725178 [ 74.455296][ T1546] [ 74.932406][ T1567] FAULT_INJECTION: forcing a failure. [ 74.932406][ T1567] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 74.945872][ T1567] CPU: 1 UID: 0 PID: 1567 Comm: syz.0.513 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 74.945917][ T1567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 74.945933][ T1567] Call Trace: [ 74.945941][ T1567] [ 74.945950][ T1567] __dump_stack+0x21/0x30 [ 74.945991][ T1567] dump_stack_lvl+0x140/0x1c0 [ 74.946022][ T1567] ? __cfi_dump_stack_lvl+0x10/0x10 [ 74.946054][ T1567] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 74.946085][ T1567] dump_stack+0x19/0x20 [ 74.946115][ T1567] should_fail_ex+0x3d7/0x530 [ 74.946146][ T1567] should_fail_alloc_page+0xec/0x110 [ 74.946171][ T1567] __alloc_pages_noprof+0x1c0/0x7e0 [ 74.946199][ T1567] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 74.946232][ T1567] __folio_alloc_noprof+0x14/0x80 [ 74.946260][ T1567] folio_prealloc+0x46/0x220 [ 74.946286][ T1567] do_pte_missing+0x169c/0x4410 [ 74.946310][ T1567] ? mlock_folio+0x25d/0x330 [ 74.946338][ T1567] ? cgroup_rstat_updated+0x141/0x810 [ 74.946363][ T1567] ? pte_marker_clear+0x1b0/0x1b0 [ 74.946386][ T1567] ? lru_gen_update_size+0x572/0x630 [ 74.946414][ T1567] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 74.946439][ T1567] ? __pte_offset_map+0x1b0/0x230 [ 74.946470][ T1567] ? pte_offset_map_rw_nolock+0xba/0x110 [ 74.946502][ T1567] handle_mm_fault+0x11b8/0x1bf0 [ 74.946523][ T1567] ? __kasan_check_write+0x18/0x20 [ 74.946559][ T1567] ? __cfi_handle_mm_fault+0x10/0x10 [ 74.946581][ T1567] ? follow_page_pte+0x4b9/0xbc0 [ 74.946614][ T1567] ? gup_must_unshare+0x1e0/0x1e0 [ 74.946637][ T1567] ? vma_is_secretmem+0x11/0x50 [ 74.946666][ T1567] __get_user_pages+0x1170/0x22b0 [ 74.946705][ T1567] ? populate_vma_page_range+0x220/0x220 [ 74.946730][ T1567] ? down_read+0x7f/0xe0 [ 74.946760][ T1567] ? __cfi_down_read+0x10/0x10 [ 74.946789][ T1567] __mm_populate+0x2f8/0x430 [ 74.946814][ T1567] do_mlock+0x7eb/0xa00 [ 74.946843][ T1567] ? fput+0x1a4/0x240 [ 74.946867][ T1567] ? lru_gen_add_folio+0x860/0x860 [ 74.946895][ T1567] ? ksys_write+0x1f3/0x260 [ 74.946928][ T1567] ? __cfi_ksys_write+0x10/0x10 [ 74.946961][ T1567] ? __kasan_check_read+0x15/0x20 [ 74.946991][ T1567] __x64_sys_mlock+0x64/0x80 [ 74.947015][ T1567] x64_sys_call+0x670/0x2ee0 [ 74.947048][ T1567] do_syscall_64+0x57/0xf0 [ 74.947083][ T1567] ? clear_bhb_loop+0x50/0xa0 [ 74.947105][ T1567] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 74.947142][ T1567] RIP: 0033:0x7f46e039c819 [ 74.947163][ T1567] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 74.947184][ T1567] RSP: 002b:00007f46dedf7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 74.947210][ T1567] RAX: ffffffffffffffda RBX: 00007f46e0615fa0 RCX: 00007f46e039c819 [ 74.947229][ T1567] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 74.947245][ T1567] RBP: 00007f46dedf7090 R08: 0000000000000000 R09: 0000000000000000 [ 74.947261][ T1567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 74.947276][ T1567] R13: 00007f46e0616038 R14: 00007f46e0615fa0 R15: 00007ffd0a725178 [ 74.947297][ T1567] [ 75.264452][ T1571] IPv6: NLM_F_CREATE should be specified when creating new route [ 75.486514][ T36] kauditd_printk_skb: 169 callbacks suppressed [ 75.486536][ T36] audit: type=1400 audit(1776127329.000:1675): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.523615][ T36] audit: type=1400 audit(1776127329.040:1676): avc: denied { create } for pid=1595 comm="syz.4.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 75.543818][ T36] audit: type=1326 audit(1776127329.040:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1595 comm="syz.4.526" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fbea1d9c819 code=0x0 [ 75.570387][ T36] audit: type=1400 audit(1776127329.090:1679): avc: denied { create } for pid=1595 comm="syz.4.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 75.604357][ T36] audit: type=1400 audit(1776127329.090:1678): avc: denied { read write } for pid=1597 comm="syz.0.527" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 75.629644][ T36] audit: type=1400 audit(1776127329.110:1680): avc: denied { create } for pid=1597 comm="syz.0.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 75.650108][ T36] audit: type=1400 audit(1776127329.120:1681): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.681195][ T36] audit: type=1400 audit(1776127329.150:1682): avc: denied { read write } for pid=1600 comm="syz.0.528" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 75.705455][ T36] audit: type=1400 audit(1776127329.150:1683): avc: denied { read write } for pid=1600 comm="syz.0.528" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 75.731776][ T36] audit: type=1400 audit(1776127329.190:1684): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 76.275879][ T1623] EXT4-fs: Value of option "test_dummy_encryption" is unrecognized [ 76.284374][ T1623] netlink: 8 bytes leftover after parsing attributes in process `syz.2.539'. [ 78.273709][ T1740] FAULT_INJECTION: forcing a failure. [ 78.273709][ T1740] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 78.326738][ T1740] CPU: 0 UID: 0 PID: 1740 Comm: syz.2.586 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 78.326784][ T1740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 78.326800][ T1740] Call Trace: [ 78.326807][ T1740] [ 78.326817][ T1740] __dump_stack+0x21/0x30 [ 78.326857][ T1740] dump_stack_lvl+0x140/0x1c0 [ 78.326887][ T1740] ? __cfi_dump_stack_lvl+0x10/0x10 [ 78.326917][ T1740] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 78.326948][ T1740] dump_stack+0x19/0x20 [ 78.326978][ T1740] should_fail_ex+0x3d7/0x530 [ 78.327010][ T1740] should_fail_alloc_page+0xec/0x110 [ 78.327039][ T1740] __alloc_pages_noprof+0x1c0/0x7e0 [ 78.327068][ T1740] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 78.327100][ T1740] __folio_alloc_noprof+0x14/0x80 [ 78.327128][ T1740] folio_prealloc+0x46/0x220 [ 78.327161][ T1740] do_pte_missing+0x169c/0x4410 [ 78.327185][ T1740] ? mlock_folio+0x25d/0x330 [ 78.327213][ T1740] ? cgroup_rstat_updated+0x141/0x810 [ 78.327237][ T1740] ? pte_marker_clear+0x1b0/0x1b0 [ 78.327261][ T1740] ? lru_gen_update_size+0x572/0x630 [ 78.327288][ T1740] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 78.327313][ T1740] ? __pte_offset_map+0x1b0/0x230 [ 78.327343][ T1740] ? pte_offset_map_rw_nolock+0xba/0x110 [ 78.327374][ T1740] handle_mm_fault+0x11b8/0x1bf0 [ 78.327395][ T1740] ? __kasan_check_write+0x18/0x20 [ 78.327429][ T1740] ? __cfi_handle_mm_fault+0x10/0x10 [ 78.327452][ T1740] ? follow_page_pte+0x4b9/0xbc0 [ 78.327480][ T1740] ? gup_must_unshare+0x1e0/0x1e0 [ 78.327504][ T1740] ? vma_is_secretmem+0x11/0x50 [ 78.327534][ T1740] __get_user_pages+0x1170/0x22b0 [ 78.327563][ T1740] ? populate_vma_page_range+0x220/0x220 [ 78.327588][ T1740] ? down_read+0x7f/0xe0 [ 78.327616][ T1740] ? __cfi_down_read+0x10/0x10 [ 78.327645][ T1740] __mm_populate+0x2f8/0x430 [ 78.327671][ T1740] do_mlock+0x7eb/0xa00 [ 78.327698][ T1740] ? fput+0x1a4/0x240 [ 78.327724][ T1740] ? lru_gen_add_folio+0x860/0x860 [ 78.327750][ T1740] ? ksys_write+0x1f3/0x260 [ 78.327782][ T1740] ? __cfi_ksys_write+0x10/0x10 [ 78.327815][ T1740] ? __kasan_check_read+0x15/0x20 [ 78.327846][ T1740] __x64_sys_mlock+0x64/0x80 [ 78.327872][ T1740] x64_sys_call+0x670/0x2ee0 [ 78.327907][ T1740] do_syscall_64+0x57/0xf0 [ 78.327941][ T1740] ? clear_bhb_loop+0x50/0xa0 [ 78.327964][ T1740] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.328001][ T1740] RIP: 0033:0x7ff87319c819 [ 78.328021][ T1740] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 78.328041][ T1740] RSP: 002b:00007ff873f73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 78.328067][ T1740] RAX: ffffffffffffffda RBX: 00007ff873415fa0 RCX: 00007ff87319c819 [ 78.328085][ T1740] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 78.328100][ T1740] RBP: 00007ff873f73090 R08: 0000000000000000 R09: 0000000000000000 [ 78.328116][ T1740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.328131][ T1740] R13: 00007ff873416038 R14: 00007ff873415fa0 R15: 00007ffdc5b57ce8 [ 78.328159][ T1740] [ 78.863088][ T1761] bridge0: port 3(syz_tun) entered blocking state [ 78.896678][ T1761] bridge0: port 3(syz_tun) entered disabled state [ 78.903355][ T1761] syz_tun: entered allmulticast mode [ 78.918272][ T1763] FAULT_INJECTION: forcing a failure. [ 78.918272][ T1763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 78.947978][ T1761] syz_tun: entered promiscuous mode [ 78.956305][ T1763] CPU: 1 UID: 0 PID: 1763 Comm: syz.0.596 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 78.956343][ T1763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 78.956359][ T1763] Call Trace: [ 78.956367][ T1763] [ 78.956377][ T1763] __dump_stack+0x21/0x30 [ 78.956416][ T1763] dump_stack_lvl+0x140/0x1c0 [ 78.956447][ T1763] ? __cfi_dump_stack_lvl+0x10/0x10 [ 78.956479][ T1763] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 78.956510][ T1763] dump_stack+0x19/0x20 [ 78.956539][ T1763] should_fail_ex+0x3d7/0x530 [ 78.956572][ T1763] should_fail_alloc_page+0xec/0x110 [ 78.956597][ T1763] __alloc_pages_noprof+0x1c0/0x7e0 [ 78.956629][ T1763] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 78.956661][ T1763] __folio_alloc_noprof+0x14/0x80 [ 78.956689][ T1763] folio_prealloc+0x46/0x220 [ 78.956716][ T1763] do_pte_missing+0x169c/0x4410 [ 78.956740][ T1763] ? mlock_folio+0x25d/0x330 [ 78.956767][ T1763] ? cgroup_rstat_updated+0x141/0x810 [ 78.956792][ T1763] ? pte_marker_clear+0x1b0/0x1b0 [ 78.956817][ T1763] ? lru_gen_update_size+0x572/0x630 [ 78.956846][ T1763] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 78.956871][ T1763] ? __pte_offset_map+0x1b0/0x230 [ 78.956901][ T1763] ? pte_offset_map_rw_nolock+0xba/0x110 [ 78.956929][ T1763] handle_mm_fault+0x11b8/0x1bf0 [ 78.956949][ T1763] ? __kasan_check_write+0x18/0x20 [ 78.956991][ T1763] ? __cfi_handle_mm_fault+0x10/0x10 [ 78.957012][ T1763] ? follow_page_pte+0x4b9/0xbc0 [ 78.957039][ T1763] ? gup_must_unshare+0x1e0/0x1e0 [ 78.957063][ T1763] ? vma_is_secretmem+0x11/0x50 [ 78.957090][ T1763] __get_user_pages+0x1170/0x22b0 [ 78.957118][ T1763] ? populate_vma_page_range+0x220/0x220 [ 78.957143][ T1763] ? down_read+0x7f/0xe0 [ 78.957173][ T1763] ? __cfi_down_read+0x10/0x10 [ 78.957202][ T1763] __mm_populate+0x2f8/0x430 [ 78.957227][ T1763] do_mlock+0x7eb/0xa00 [ 78.957255][ T1763] ? fput+0x1a4/0x240 [ 78.957281][ T1763] ? lru_gen_add_folio+0x860/0x860 [ 78.957309][ T1763] ? ksys_write+0x1f3/0x260 [ 78.957342][ T1763] ? __cfi_ksys_write+0x10/0x10 [ 78.957375][ T1763] ? __kasan_check_read+0x15/0x20 [ 78.957407][ T1763] __x64_sys_mlock+0x64/0x80 [ 78.957433][ T1763] x64_sys_call+0x670/0x2ee0 [ 78.957467][ T1763] do_syscall_64+0x57/0xf0 [ 78.957502][ T1763] ? clear_bhb_loop+0x50/0xa0 [ 78.957526][ T1763] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.957568][ T1763] RIP: 0033:0x7f46e039c819 [ 78.957589][ T1763] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 78.957609][ T1763] RSP: 002b:00007f46dedf7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 78.957635][ T1763] RAX: ffffffffffffffda RBX: 00007f46e0615fa0 RCX: 00007f46e039c819 [ 78.957655][ T1763] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 78.957672][ T1763] RBP: 00007f46dedf7090 R08: 0000000000000000 R09: 0000000000000000 [ 78.957689][ T1763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.957705][ T1763] R13: 00007f46e0616038 R14: 00007f46e0615fa0 R15: 00007ffd0a725178 [ 78.957727][ T1763] [ 79.147241][ T1761] bridge0: port 3(syz_tun) entered blocking state [ 79.271569][ T1761] bridge0: port 3(syz_tun) entered forwarding state [ 79.367711][ T1771] FAULT_INJECTION: forcing a failure. [ 79.367711][ T1771] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 79.396772][ T1771] CPU: 0 UID: 0 PID: 1771 Comm: syz.0.599 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 79.396811][ T1771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 79.396826][ T1771] Call Trace: [ 79.396834][ T1771] [ 79.396842][ T1771] __dump_stack+0x21/0x30 [ 79.396877][ T1771] dump_stack_lvl+0x140/0x1c0 [ 79.396905][ T1771] ? __cfi_dump_stack_lvl+0x10/0x10 [ 79.396941][ T1771] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 79.396968][ T1771] dump_stack+0x19/0x20 [ 79.396994][ T1771] should_fail_ex+0x3d7/0x530 [ 79.397025][ T1771] should_fail_alloc_page+0xec/0x110 [ 79.397049][ T1771] __alloc_pages_noprof+0x1c0/0x7e0 [ 79.397076][ T1771] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 79.397108][ T1771] __folio_alloc_noprof+0x14/0x80 [ 79.397132][ T1771] folio_prealloc+0x46/0x220 [ 79.397154][ T1771] do_pte_missing+0x169c/0x4410 [ 79.397179][ T1771] ? cgroup_rstat_updated+0x141/0x810 [ 79.397201][ T1771] ? pte_marker_clear+0x1b0/0x1b0 [ 79.397223][ T1771] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 79.397245][ T1771] ? walk_pgd_range+0x1b58/0x1c20 [ 79.397271][ T1771] ? __pte_offset_map+0x1b0/0x230 [ 79.397298][ T1771] ? pte_offset_map_rw_nolock+0xba/0x110 [ 79.397326][ T1771] handle_mm_fault+0x11b8/0x1bf0 [ 79.397346][ T1771] ? __kasan_check_write+0x18/0x20 [ 79.397380][ T1771] ? __cfi_handle_mm_fault+0x10/0x10 [ 79.397401][ T1771] ? follow_page_pte+0x4b9/0xbc0 [ 79.397432][ T1771] ? gup_must_unshare+0x1e0/0x1e0 [ 79.397454][ T1771] ? vma_is_secretmem+0x11/0x50 [ 79.397477][ T1771] __get_user_pages+0x1170/0x22b0 [ 79.397503][ T1771] ? populate_vma_page_range+0x220/0x220 [ 79.397525][ T1771] ? down_read+0x7f/0xe0 [ 79.397550][ T1771] ? __cfi_down_read+0x10/0x10 [ 79.397575][ T1771] __mm_populate+0x2f8/0x430 [ 79.397597][ T1771] do_mlock+0x7eb/0xa00 [ 79.397621][ T1771] ? fput+0x1a4/0x240 [ 79.397641][ T1771] ? lru_gen_add_folio+0x860/0x860 [ 79.397665][ T1771] ? ksys_write+0x1f3/0x260 [ 79.397695][ T1771] ? __cfi_ksys_write+0x10/0x10 [ 79.397726][ T1771] ? __kasan_check_read+0x15/0x20 [ 79.397756][ T1771] __x64_sys_mlock+0x64/0x80 [ 79.397782][ T1771] x64_sys_call+0x670/0x2ee0 [ 79.397814][ T1771] do_syscall_64+0x57/0xf0 [ 79.397847][ T1771] ? clear_bhb_loop+0x50/0xa0 [ 79.397870][ T1771] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 79.397904][ T1771] RIP: 0033:0x7f46e039c819 [ 79.397933][ T1771] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 79.397953][ T1771] RSP: 002b:00007f46dedf7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 79.397979][ T1771] RAX: ffffffffffffffda RBX: 00007f46e0615fa0 RCX: 00007f46e039c819 [ 79.397997][ T1771] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 79.398013][ T1771] RBP: 00007f46dedf7090 R08: 0000000000000000 R09: 0000000000000000 [ 79.398028][ T1771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 79.398043][ T1771] R13: 00007f46e0616038 R14: 00007f46e0615fa0 R15: 00007ffd0a725178 [ 79.398063][ T1771] [ 80.096066][ T1789] FAULT_INJECTION: forcing a failure. [ 80.096066][ T1789] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 80.122663][ T1789] CPU: 1 UID: 0 PID: 1789 Comm: syz.1.607 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 80.122703][ T1789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 80.122719][ T1789] Call Trace: [ 80.122726][ T1789] [ 80.122736][ T1789] __dump_stack+0x21/0x30 [ 80.122772][ T1789] dump_stack_lvl+0x140/0x1c0 [ 80.122803][ T1789] ? __cfi_dump_stack_lvl+0x10/0x10 [ 80.122834][ T1789] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 80.122863][ T1789] dump_stack+0x19/0x20 [ 80.122892][ T1789] should_fail_ex+0x3d7/0x530 [ 80.122924][ T1789] should_fail_alloc_page+0xec/0x110 [ 80.122948][ T1789] __alloc_pages_noprof+0x1c0/0x7e0 [ 80.122976][ T1789] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 80.123009][ T1789] __folio_alloc_noprof+0x14/0x80 [ 80.123037][ T1789] folio_prealloc+0x46/0x220 [ 80.123062][ T1789] do_pte_missing+0x169c/0x4410 [ 80.123085][ T1789] ? mlock_folio+0x25d/0x330 [ 80.123121][ T1789] ? cgroup_rstat_updated+0x141/0x810 [ 80.123145][ T1789] ? pte_marker_clear+0x1b0/0x1b0 [ 80.123169][ T1789] ? lru_gen_update_size+0x572/0x630 [ 80.123196][ T1789] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 80.123221][ T1789] ? __pte_offset_map+0x1b0/0x230 [ 80.123251][ T1789] ? pte_offset_map_rw_nolock+0xba/0x110 [ 80.123283][ T1789] handle_mm_fault+0x11b8/0x1bf0 [ 80.123304][ T1789] ? __kasan_check_write+0x18/0x20 [ 80.123339][ T1789] ? __cfi_handle_mm_fault+0x10/0x10 [ 80.123361][ T1789] ? follow_page_pte+0x4b9/0xbc0 [ 80.123389][ T1789] ? gup_must_unshare+0x1e0/0x1e0 [ 80.123415][ T1789] ? vma_is_secretmem+0x11/0x50 [ 80.123444][ T1789] __get_user_pages+0x1170/0x22b0 [ 80.123474][ T1789] ? populate_vma_page_range+0x220/0x220 [ 80.123499][ T1789] ? down_read+0x7f/0xe0 [ 80.123527][ T1789] ? __cfi_down_read+0x10/0x10 [ 80.123557][ T1789] __mm_populate+0x2f8/0x430 [ 80.123583][ T1789] do_mlock+0x7eb/0xa00 [ 80.123611][ T1789] ? fput+0x1a4/0x240 [ 80.123635][ T1789] ? lru_gen_add_folio+0x860/0x860 [ 80.123662][ T1789] ? ksys_write+0x1f3/0x260 [ 80.123695][ T1789] ? __cfi_ksys_write+0x10/0x10 [ 80.123727][ T1789] ? __kasan_check_read+0x15/0x20 [ 80.123759][ T1789] __x64_sys_mlock+0x64/0x80 [ 80.123787][ T1789] x64_sys_call+0x670/0x2ee0 [ 80.123820][ T1789] do_syscall_64+0x57/0xf0 [ 80.123855][ T1789] ? clear_bhb_loop+0x50/0xa0 [ 80.123880][ T1789] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 80.123916][ T1789] RIP: 0033:0x7fc3b959c819 [ 80.123937][ T1789] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 80.123958][ T1789] RSP: 002b:00007fc3ba494028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 80.123985][ T1789] RAX: ffffffffffffffda RBX: 00007fc3b9815fa0 RCX: 00007fc3b959c819 [ 80.124004][ T1789] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 80.124021][ T1789] RBP: 00007fc3ba494090 R08: 0000000000000000 R09: 0000000000000000 [ 80.124037][ T1789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 80.124052][ T1789] R13: 00007fc3b9816038 R14: 00007fc3b9815fa0 R15: 00007ffd7c95ca38 [ 80.124074][ T1789] [ 80.539491][ T36] kauditd_printk_skb: 242 callbacks suppressed [ 80.539513][ T36] audit: type=1400 audit(1776127334.060:1927): avc: denied { create } for pid=1795 comm="syz.0.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 80.578739][ T36] audit: type=1400 audit(1776127334.090:1928): avc: denied { read write } for pid=293 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.686833][ T36] audit: type=1400 audit(1776127334.100:1929): avc: denied { create } for pid=1799 comm="syz.1.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 80.706487][ T36] audit: type=1400 audit(1776127334.200:1930): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.730866][ T36] audit: type=1400 audit(1776127334.200:1931): avc: denied { create } for pid=1799 comm="syz.1.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 80.828756][ T36] audit: type=1400 audit(1776127334.350:1932): avc: denied { read write } for pid=293 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.894965][ T36] audit: type=1400 audit(1776127334.370:1933): avc: denied { create } for pid=1804 comm="syz.1.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 80.929393][ T36] audit: type=1400 audit(1776127334.370:1934): avc: denied { create } for pid=1804 comm="syz.1.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 80.961441][ T36] audit: type=1400 audit(1776127334.370:1935): avc: denied { create } for pid=1804 comm="syz.1.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 80.982389][ T36] audit: type=1400 audit(1776127334.380:1936): avc: denied { read write } for pid=293 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.982389][ T1817] FAULT_INJECTION: forcing a failure. [ 80.982389][ T1817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 81.044187][ T1824] FAULT_INJECTION: forcing a failure. [ 81.044187][ T1824] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 81.057188][ T1817] CPU: 1 UID: 0 PID: 1817 Comm: syz.4.618 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 81.057311][ T1817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 81.057354][ T1817] Call Trace: [ 81.057384][ T1817] [ 81.057407][ T1817] __dump_stack+0x21/0x30 [ 81.057507][ T1817] dump_stack_lvl+0x140/0x1c0 [ 81.057574][ T1817] ? __cfi_dump_stack_lvl+0x10/0x10 [ 81.057602][ T1817] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 81.057630][ T1817] dump_stack+0x19/0x20 [ 81.057655][ T1817] should_fail_ex+0x3d7/0x530 [ 81.057683][ T1817] should_fail_alloc_page+0xec/0x110 [ 81.057705][ T1817] __alloc_pages_noprof+0x1c0/0x7e0 [ 81.057749][ T1817] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 81.057861][ T1817] __folio_alloc_noprof+0x14/0x80 [ 81.057965][ T1817] folio_prealloc+0x46/0x220 [ 81.058023][ T1817] do_pte_missing+0x169c/0x4410 [ 81.058100][ T1817] ? cgroup_rstat_updated+0x141/0x810 [ 81.058161][ T1817] ? pte_marker_clear+0x1b0/0x1b0 [ 81.058222][ T1817] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 81.058320][ T1817] ? walk_pgd_range+0x1b58/0x1c20 [ 81.058395][ T1817] ? __pte_offset_map+0x1b0/0x230 [ 81.058471][ T1817] ? pte_offset_map_rw_nolock+0xba/0x110 [ 81.058549][ T1817] handle_mm_fault+0x11b8/0x1bf0 [ 81.058604][ T1817] ? __kasan_check_write+0x18/0x20 [ 81.058693][ T1817] ? __cfi_handle_mm_fault+0x10/0x10 [ 81.058741][ T1817] ? follow_page_pte+0x4b9/0xbc0 [ 81.058822][ T1817] ? gup_must_unshare+0x1e0/0x1e0 [ 81.058891][ T1817] ? vma_is_secretmem+0x11/0x50 [ 81.058968][ T1817] __get_user_pages+0x1170/0x22b0 [ 81.059038][ T1817] ? populate_vma_page_range+0x220/0x220 [ 81.059102][ T1817] ? down_read+0x7f/0xe0 [ 81.059164][ T1817] ? __cfi_down_read+0x10/0x10 [ 81.059256][ T1817] __mm_populate+0x2f8/0x430 [ 81.059334][ T1817] do_mlock+0x7eb/0xa00 [ 81.059419][ T1817] ? fput+0x1a4/0x240 [ 81.059483][ T1817] ? lru_gen_add_folio+0x860/0x860 [ 81.059551][ T1817] ? ksys_write+0x1f3/0x260 [ 81.059629][ T1817] ? __cfi_ksys_write+0x10/0x10 [ 81.059707][ T1817] ? __kasan_check_read+0x15/0x20 [ 81.059791][ T1817] __x64_sys_mlock+0x64/0x80 [ 81.059849][ T1817] x64_sys_call+0x670/0x2ee0 [ 81.059936][ T1817] do_syscall_64+0x57/0xf0 [ 81.060027][ T1817] ? clear_bhb_loop+0x50/0xa0 [ 81.060105][ T1817] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 81.060209][ T1817] RIP: 0033:0x7fbea1d9c819 [ 81.060266][ T1817] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 81.060322][ T1817] RSP: 002b:00007fbea2ce6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 81.060387][ T1817] RAX: ffffffffffffffda RBX: 00007fbea2015fa0 RCX: 00007fbea1d9c819 [ 81.060439][ T1817] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 81.060476][ T1817] RBP: 00007fbea2ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 81.060519][ T1817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 81.060561][ T1817] R13: 00007fbea2016038 R14: 00007fbea2015fa0 R15: 00007ffdd6cbc138 [ 81.060631][ T1817] [ 81.363088][ T1824] CPU: 0 UID: 0 PID: 1824 Comm: syz.2.621 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 81.363128][ T1824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 81.363143][ T1824] Call Trace: [ 81.363151][ T1824] [ 81.363161][ T1824] __dump_stack+0x21/0x30 [ 81.363201][ T1824] dump_stack_lvl+0x140/0x1c0 [ 81.363232][ T1824] ? __cfi_dump_stack_lvl+0x10/0x10 [ 81.363263][ T1824] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 81.363296][ T1824] dump_stack+0x19/0x20 [ 81.363325][ T1824] should_fail_ex+0x3d7/0x530 [ 81.363359][ T1824] should_fail_alloc_page+0xec/0x110 [ 81.363385][ T1824] __alloc_pages_noprof+0x1c0/0x7e0 [ 81.363414][ T1824] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 81.363448][ T1824] __folio_alloc_noprof+0x14/0x80 [ 81.363475][ T1824] folio_prealloc+0x46/0x220 [ 81.363502][ T1824] do_pte_missing+0x169c/0x4410 [ 81.363526][ T1824] ? mlock_folio+0x25d/0x330 [ 81.363554][ T1824] ? cgroup_rstat_updated+0x141/0x810 [ 81.363578][ T1824] ? pte_marker_clear+0x1b0/0x1b0 [ 81.363603][ T1824] ? lru_gen_update_size+0x572/0x630 [ 81.363632][ T1824] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 81.363658][ T1824] ? __pte_offset_map+0x1b0/0x230 [ 81.363688][ T1824] ? pte_offset_map_rw_nolock+0xba/0x110 [ 81.363719][ T1824] handle_mm_fault+0x11b8/0x1bf0 [ 81.363738][ T1824] ? __kasan_check_write+0x18/0x20 [ 81.363773][ T1824] ? __cfi_handle_mm_fault+0x10/0x10 [ 81.363795][ T1824] ? follow_page_pte+0x4b9/0xbc0 [ 81.363822][ T1824] ? gup_must_unshare+0x1e0/0x1e0 [ 81.363848][ T1824] ? vma_is_secretmem+0x11/0x50 [ 81.363876][ T1824] __get_user_pages+0x1170/0x22b0 [ 81.363907][ T1824] ? populate_vma_page_range+0x220/0x220 [ 81.363932][ T1824] ? down_read+0x7f/0xe0 [ 81.363969][ T1824] ? __cfi_down_read+0x10/0x10 [ 81.363999][ T1824] __mm_populate+0x2f8/0x430 [ 81.364025][ T1824] do_mlock+0x7eb/0xa00 [ 81.364052][ T1824] ? fput+0x1a4/0x240 [ 81.364077][ T1824] ? lru_gen_add_folio+0x860/0x860 [ 81.364105][ T1824] ? ksys_write+0x1f3/0x260 [ 81.364138][ T1824] ? __cfi_ksys_write+0x10/0x10 [ 81.364171][ T1824] ? __kasan_check_read+0x15/0x20 [ 81.364203][ T1824] __x64_sys_mlock+0x64/0x80 [ 81.364229][ T1824] x64_sys_call+0x670/0x2ee0 [ 81.364264][ T1824] do_syscall_64+0x57/0xf0 [ 81.364298][ T1824] ? clear_bhb_loop+0x50/0xa0 [ 81.364322][ T1824] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 81.364358][ T1824] RIP: 0033:0x7ff87319c819 [ 81.364379][ T1824] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 81.364401][ T1824] RSP: 002b:00007ff873f73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 81.364428][ T1824] RAX: ffffffffffffffda RBX: 00007ff873415fa0 RCX: 00007ff87319c819 [ 81.364446][ T1824] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 81.364463][ T1824] RBP: 00007ff873f73090 R08: 0000000000000000 R09: 0000000000000000 [ 81.364478][ T1824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 81.364494][ T1824] R13: 00007ff873416038 R14: 00007ff873415fa0 R15: 00007ffdc5b57ce8 [ 81.364516][ T1824] [ 82.528299][ T1906] FAULT_INJECTION: forcing a failure. [ 82.528299][ T1906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 82.586682][ T1906] CPU: 0 UID: 0 PID: 1906 Comm: syz.2.650 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 82.586788][ T1906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 82.586804][ T1906] Call Trace: [ 82.586812][ T1906] [ 82.586823][ T1906] __dump_stack+0x21/0x30 [ 82.586862][ T1906] dump_stack_lvl+0x140/0x1c0 [ 82.586892][ T1906] ? __cfi_dump_stack_lvl+0x10/0x10 [ 82.586933][ T1906] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 82.586966][ T1906] dump_stack+0x19/0x20 [ 82.587000][ T1906] should_fail_ex+0x3d7/0x530 [ 82.587034][ T1906] should_fail_alloc_page+0xec/0x110 [ 82.587057][ T1906] __alloc_pages_noprof+0x1c0/0x7e0 [ 82.587085][ T1906] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 82.587114][ T1906] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 82.587157][ T1906] __folio_alloc_noprof+0x14/0x80 [ 82.587184][ T1906] folio_prealloc+0x46/0x220 [ 82.587210][ T1906] do_pte_missing+0x169c/0x4410 [ 82.587234][ T1906] ? mlock_folio+0x25d/0x330 [ 82.587262][ T1906] ? cgroup_rstat_updated+0x141/0x810 [ 82.587286][ T1906] ? pte_marker_clear+0x1b0/0x1b0 [ 82.587309][ T1906] ? lru_gen_update_size+0x572/0x630 [ 82.587335][ T1906] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 82.587358][ T1906] ? __pte_offset_map+0x1b0/0x230 [ 82.587387][ T1906] ? pte_offset_map_rw_nolock+0xba/0x110 [ 82.587417][ T1906] handle_mm_fault+0x11b8/0x1bf0 [ 82.587438][ T1906] ? __kasan_check_write+0x18/0x20 [ 82.587475][ T1906] ? __cfi_handle_mm_fault+0x10/0x10 [ 82.587497][ T1906] ? follow_page_pte+0x4b9/0xbc0 [ 82.587527][ T1906] ? gup_must_unshare+0x1e0/0x1e0 [ 82.587554][ T1906] ? vma_is_secretmem+0x11/0x50 [ 82.587584][ T1906] __get_user_pages+0x1170/0x22b0 [ 82.587615][ T1906] ? populate_vma_page_range+0x220/0x220 [ 82.587641][ T1906] ? down_read+0x7f/0xe0 [ 82.587669][ T1906] ? __cfi_down_read+0x10/0x10 [ 82.587706][ T1906] __mm_populate+0x2f8/0x430 [ 82.587732][ T1906] do_mlock+0x7eb/0xa00 [ 82.587760][ T1906] ? fput+0x1a4/0x240 [ 82.587786][ T1906] ? lru_gen_add_folio+0x860/0x860 [ 82.587814][ T1906] ? ksys_write+0x1f3/0x260 [ 82.587847][ T1906] ? __cfi_ksys_write+0x10/0x10 [ 82.587880][ T1906] ? __kasan_check_read+0x15/0x20 [ 82.587912][ T1906] __x64_sys_mlock+0x64/0x80 [ 82.587939][ T1906] x64_sys_call+0x670/0x2ee0 [ 82.587974][ T1906] do_syscall_64+0x57/0xf0 [ 82.588010][ T1906] ? clear_bhb_loop+0x50/0xa0 [ 82.588034][ T1906] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 82.588071][ T1906] RIP: 0033:0x7ff87319c819 [ 82.588092][ T1906] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 82.588114][ T1906] RSP: 002b:00007ff873f73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 82.588141][ T1906] RAX: ffffffffffffffda RBX: 00007ff873415fa0 RCX: 00007ff87319c819 [ 82.588161][ T1906] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 82.588178][ T1906] RBP: 00007ff873f73090 R08: 0000000000000000 R09: 0000000000000000 [ 82.588195][ T1906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 82.588211][ T1906] R13: 00007ff873416038 R14: 00007ff873415fa0 R15: 00007ffdc5b57ce8 [ 82.588233][ T1906] [ 83.110220][ T1941] futex_wake_op: syz.4.662 tries to shift op by 144; fix this program [ 83.118778][ T1942] futex_wake_op: syz.4.662 tries to shift op by 144; fix this program [ 83.127935][ T1941] netlink: 20 bytes leftover after parsing attributes in process `syz.4.662'. [ 83.154078][ T1944] FAULT_INJECTION: forcing a failure. [ 83.154078][ T1944] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 83.175078][ T1944] CPU: 1 UID: 0 PID: 1944 Comm: syz.4.663 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 83.175122][ T1944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 83.175139][ T1944] Call Trace: [ 83.175148][ T1944] [ 83.175158][ T1944] __dump_stack+0x21/0x30 [ 83.175196][ T1944] dump_stack_lvl+0x140/0x1c0 [ 83.175228][ T1944] ? __cfi_dump_stack_lvl+0x10/0x10 [ 83.175261][ T1944] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 83.175292][ T1944] dump_stack+0x19/0x20 [ 83.175322][ T1944] should_fail_ex+0x3d7/0x530 [ 83.175354][ T1944] should_fail_alloc_page+0xec/0x110 [ 83.175380][ T1944] __alloc_pages_noprof+0x1c0/0x7e0 [ 83.175408][ T1944] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 83.175442][ T1944] __folio_alloc_noprof+0x14/0x80 [ 83.175471][ T1944] folio_prealloc+0x46/0x220 [ 83.175496][ T1944] do_pte_missing+0x169c/0x4410 [ 83.175520][ T1944] ? mlock_folio+0x25d/0x330 [ 83.175550][ T1944] ? cgroup_rstat_updated+0x141/0x810 [ 83.175575][ T1944] ? pte_marker_clear+0x1b0/0x1b0 [ 83.175600][ T1944] ? lru_gen_update_size+0x572/0x630 [ 83.175628][ T1944] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 83.175653][ T1944] ? __pte_offset_map+0x1b0/0x230 [ 83.175685][ T1944] ? pte_offset_map_rw_nolock+0xba/0x110 [ 83.175718][ T1944] handle_mm_fault+0x11b8/0x1bf0 [ 83.175739][ T1944] ? __kasan_check_write+0x18/0x20 [ 83.175776][ T1944] ? __cfi_handle_mm_fault+0x10/0x10 [ 83.175799][ T1944] ? follow_page_pte+0x4b9/0xbc0 [ 83.175829][ T1944] ? gup_must_unshare+0x1e0/0x1e0 [ 83.175857][ T1944] ? vma_is_secretmem+0x11/0x50 [ 83.175887][ T1944] __get_user_pages+0x1170/0x22b0 [ 83.175925][ T1944] ? populate_vma_page_range+0x220/0x220 [ 83.175951][ T1944] ? down_read+0x7f/0xe0 [ 83.175981][ T1944] ? __cfi_down_read+0x10/0x10 [ 83.176012][ T1944] __mm_populate+0x2f8/0x430 [ 83.176038][ T1944] do_mlock+0x7eb/0xa00 [ 83.176067][ T1944] ? fput+0x1a4/0x240 [ 83.176092][ T1944] ? lru_gen_add_folio+0x860/0x860 [ 83.176121][ T1944] ? ksys_write+0x1f3/0x260 [ 83.176154][ T1944] ? __cfi_ksys_write+0x10/0x10 [ 83.176188][ T1944] ? __kasan_check_read+0x15/0x20 [ 83.176220][ T1944] __x64_sys_mlock+0x64/0x80 [ 83.176247][ T1944] x64_sys_call+0x670/0x2ee0 [ 83.176282][ T1944] do_syscall_64+0x57/0xf0 [ 83.176317][ T1944] ? clear_bhb_loop+0x50/0xa0 [ 83.176341][ T1944] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 83.176377][ T1944] RIP: 0033:0x7fbea1d9c819 [ 83.176398][ T1944] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 83.176419][ T1944] RSP: 002b:00007fbea2ce6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 83.176445][ T1944] RAX: ffffffffffffffda RBX: 00007fbea2015fa0 RCX: 00007fbea1d9c819 [ 83.176465][ T1944] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 83.176482][ T1944] RBP: 00007fbea2ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 83.176498][ T1944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 83.176514][ T1944] R13: 00007fbea2016038 R14: 00007fbea2015fa0 R15: 00007ffdd6cbc138 [ 83.176535][ T1944] [ 83.806264][ T1973] FAULT_INJECTION: forcing a failure. [ 83.806264][ T1973] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 83.846936][ T1973] CPU: 0 UID: 0 PID: 1973 Comm: syz.4.672 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 83.846975][ T1973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 83.846990][ T1973] Call Trace: [ 83.846998][ T1973] [ 83.847007][ T1973] __dump_stack+0x21/0x30 [ 83.847043][ T1973] dump_stack_lvl+0x140/0x1c0 [ 83.847073][ T1973] ? __cfi_dump_stack_lvl+0x10/0x10 [ 83.847101][ T1973] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 83.847128][ T1973] dump_stack+0x19/0x20 [ 83.847154][ T1973] should_fail_ex+0x3d7/0x530 [ 83.847183][ T1973] should_fail_alloc_page+0xec/0x110 [ 83.847207][ T1973] __alloc_pages_noprof+0x1c0/0x7e0 [ 83.847232][ T1973] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 83.847261][ T1973] __folio_alloc_noprof+0x14/0x80 [ 83.847288][ T1973] folio_prealloc+0x46/0x220 [ 83.847312][ T1973] do_pte_missing+0x169c/0x4410 [ 83.847339][ T1973] ? cgroup_rstat_updated+0x141/0x810 [ 83.847361][ T1973] ? pte_marker_clear+0x1b0/0x1b0 [ 83.847386][ T1973] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 83.847410][ T1973] ? walk_pgd_range+0x1b58/0x1c20 [ 83.847437][ T1973] ? __pte_offset_map+0x1b0/0x230 [ 83.847468][ T1973] ? pte_offset_map_rw_nolock+0xba/0x110 [ 83.847500][ T1973] handle_mm_fault+0x11b8/0x1bf0 [ 83.847522][ T1973] ? __kasan_check_write+0x18/0x20 [ 83.847557][ T1973] ? __cfi_handle_mm_fault+0x10/0x10 [ 83.847580][ T1973] ? follow_page_pte+0x4b9/0xbc0 [ 83.847608][ T1973] ? gup_must_unshare+0x1e0/0x1e0 [ 83.847636][ T1973] ? vma_is_secretmem+0x11/0x50 [ 83.847664][ T1973] __get_user_pages+0x1170/0x22b0 [ 83.847696][ T1973] ? populate_vma_page_range+0x220/0x220 [ 83.847721][ T1973] ? down_read+0x7f/0xe0 [ 83.847748][ T1973] ? __cfi_down_read+0x10/0x10 [ 83.847779][ T1973] __mm_populate+0x2f8/0x430 [ 83.847805][ T1973] do_mlock+0x7eb/0xa00 [ 83.847842][ T1973] ? fput+0x1a4/0x240 [ 83.847867][ T1973] ? lru_gen_add_folio+0x860/0x860 [ 83.847895][ T1973] ? ksys_write+0x1f3/0x260 [ 83.847928][ T1973] ? __cfi_ksys_write+0x10/0x10 [ 83.847962][ T1973] ? __kasan_check_read+0x15/0x20 [ 83.847994][ T1973] __x64_sys_mlock+0x64/0x80 [ 83.848021][ T1973] x64_sys_call+0x670/0x2ee0 [ 83.848055][ T1973] do_syscall_64+0x57/0xf0 [ 83.848090][ T1973] ? clear_bhb_loop+0x50/0xa0 [ 83.848115][ T1973] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 83.848151][ T1973] RIP: 0033:0x7fbea1d9c819 [ 83.848172][ T1973] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 83.848195][ T1973] RSP: 002b:00007fbea2ce6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 83.848223][ T1973] RAX: ffffffffffffffda RBX: 00007fbea2015fa0 RCX: 00007fbea1d9c819 [ 83.848242][ T1973] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 83.848259][ T1973] RBP: 00007fbea2ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 83.848276][ T1973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 83.848292][ T1973] R13: 00007fbea2016038 R14: 00007fbea2015fa0 R15: 00007ffdd6cbc138 [ 83.848314][ T1973] [ 84.248352][ T1982] FAULT_INJECTION: forcing a failure. [ 84.248352][ T1982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 84.271916][ T1982] CPU: 1 UID: 0 PID: 1982 Comm: syz.4.675 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 84.271960][ T1982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 84.271977][ T1982] Call Trace: [ 84.271985][ T1982] [ 84.271995][ T1982] __dump_stack+0x21/0x30 [ 84.272032][ T1982] dump_stack_lvl+0x140/0x1c0 [ 84.272063][ T1982] ? __cfi_dump_stack_lvl+0x10/0x10 [ 84.272095][ T1982] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 84.272127][ T1982] dump_stack+0x19/0x20 [ 84.272156][ T1982] should_fail_ex+0x3d7/0x530 [ 84.272188][ T1982] should_fail_alloc_page+0xec/0x110 [ 84.272213][ T1982] __alloc_pages_noprof+0x1c0/0x7e0 [ 84.272243][ T1982] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 84.272277][ T1982] __folio_alloc_noprof+0x14/0x80 [ 84.272305][ T1982] folio_prealloc+0x46/0x220 [ 84.272331][ T1982] do_pte_missing+0x169c/0x4410 [ 84.272356][ T1982] ? mlock_folio+0x25d/0x330 [ 84.272385][ T1982] ? cgroup_rstat_updated+0x141/0x810 [ 84.272410][ T1982] ? pte_marker_clear+0x1b0/0x1b0 [ 84.272434][ T1982] ? lru_gen_update_size+0x572/0x630 [ 84.272463][ T1982] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 84.272488][ T1982] ? __pte_offset_map+0x1b0/0x230 [ 84.272520][ T1982] ? pte_offset_map_rw_nolock+0xba/0x110 [ 84.272551][ T1982] handle_mm_fault+0x11b8/0x1bf0 [ 84.272574][ T1982] ? __kasan_check_write+0x18/0x20 [ 84.272610][ T1982] ? __cfi_handle_mm_fault+0x10/0x10 [ 84.272634][ T1982] ? follow_page_pte+0x4b9/0xbc0 [ 84.272663][ T1982] ? gup_must_unshare+0x1e0/0x1e0 [ 84.272690][ T1982] ? vma_is_secretmem+0x11/0x50 [ 84.272720][ T1982] __get_user_pages+0x1170/0x22b0 [ 84.272751][ T1982] ? populate_vma_page_range+0x220/0x220 [ 84.272777][ T1982] ? down_read+0x7f/0xe0 [ 84.272815][ T1982] ? __cfi_down_read+0x10/0x10 [ 84.272845][ T1982] __mm_populate+0x2f8/0x430 [ 84.272872][ T1982] do_mlock+0x7eb/0xa00 [ 84.272902][ T1982] ? fput+0x1a4/0x240 [ 84.272927][ T1982] ? lru_gen_add_folio+0x860/0x860 [ 84.272956][ T1982] ? ksys_write+0x1f3/0x260 [ 84.272989][ T1982] ? __cfi_ksys_write+0x10/0x10 [ 84.273024][ T1982] ? __kasan_check_read+0x15/0x20 [ 84.273056][ T1982] __x64_sys_mlock+0x64/0x80 [ 84.273084][ T1982] x64_sys_call+0x670/0x2ee0 [ 84.273119][ T1982] do_syscall_64+0x57/0xf0 [ 84.273154][ T1982] ? clear_bhb_loop+0x50/0xa0 [ 84.273178][ T1982] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 84.273216][ T1982] RIP: 0033:0x7fbea1d9c819 [ 84.273238][ T1982] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 84.273260][ T1982] RSP: 002b:00007fbea2ce6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 84.273287][ T1982] RAX: ffffffffffffffda RBX: 00007fbea2015fa0 RCX: 00007fbea1d9c819 [ 84.273307][ T1982] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 84.273325][ T1982] RBP: 00007fbea2ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 84.273342][ T1982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 84.273358][ T1982] R13: 00007fbea2016038 R14: 00007fbea2015fa0 R15: 00007ffdd6cbc138 [ 84.273381][ T1982] [ 85.059334][ T2022] FAULT_INJECTION: forcing a failure. [ 85.059334][ T2022] name failslab, interval 1, probability 0, space 0, times 0 [ 85.072871][ T2022] CPU: 1 UID: 0 PID: 2022 Comm: syz.4.693 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 85.072919][ T2022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 85.072935][ T2022] Call Trace: [ 85.072944][ T2022] [ 85.072955][ T2022] __dump_stack+0x21/0x30 [ 85.072994][ T2022] dump_stack_lvl+0x140/0x1c0 [ 85.073023][ T2022] ? __cfi_dump_stack_lvl+0x10/0x10 [ 85.073055][ T2022] dump_stack+0x19/0x20 [ 85.073083][ T2022] should_fail_ex+0x3d7/0x530 [ 85.073114][ T2022] should_failslab+0xac/0x100 [ 85.073138][ T2022] kmem_cache_alloc_noprof+0x42/0x410 [ 85.073170][ T2022] ? __kernfs_new_node+0xf1/0x740 [ 85.073194][ T2022] ? __kasan_check_write+0x18/0x20 [ 85.073226][ T2022] __kernfs_new_node+0xf1/0x740 [ 85.073250][ T2022] ? kernfs_new_node+0x280/0x280 [ 85.073273][ T2022] ? __kernfs_create_file+0x203/0x280 [ 85.073302][ T2022] ? __kasan_check_write+0x18/0x20 [ 85.073332][ T2022] ? sysfs_add_file_mode_ns+0x1f3/0x280 [ 85.073363][ T2022] kernfs_new_node+0x154/0x280 [ 85.073386][ T2022] kernfs_create_dir_ns+0x4b/0x130 [ 85.073411][ T2022] internal_create_group+0x445/0xeb0 [ 85.073447][ T2022] ? __cfi_dev_add_physical_location+0x10/0x10 [ 85.073481][ T2022] ? sysfs_create_group+0x40/0x40 [ 85.073513][ T2022] ? device_add_attrs+0x72d/0x850 [ 85.073537][ T2022] sysfs_create_group+0x23/0x40 [ 85.073569][ T2022] dpm_sysfs_add+0x6e/0x280 [ 85.073601][ T2022] device_add+0x52e/0xbf0 [ 85.073621][ T2022] ? device_initialize+0x2e7/0x380 [ 85.073643][ T2022] rfkill_register+0x16c/0x800 [ 85.073667][ T2022] hci_register_dev+0x3a7/0x7f0 [ 85.073694][ T2022] hci_uart_tty_ioctl+0x89f/0xa20 [ 85.073731][ T2022] ? __cfi_hci_uart_tty_ioctl+0x10/0x10 [ 85.073766][ T2022] tty_ioctl+0xa65/0xec0 [ 85.073795][ T2022] ? __cfi_tty_ioctl+0x10/0x10 [ 85.073821][ T2022] __se_sys_ioctl+0x132/0x1b0 [ 85.073844][ T2022] __x64_sys_ioctl+0x7f/0xa0 [ 85.073866][ T2022] x64_sys_call+0x1878/0x2ee0 [ 85.073898][ T2022] do_syscall_64+0x57/0xf0 [ 85.073939][ T2022] ? clear_bhb_loop+0x50/0xa0 [ 85.073964][ T2022] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 85.074066][ T2022] RIP: 0033:0x7fbea1d9c819 [ 85.074093][ T2022] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 85.074115][ T2022] RSP: 002b:00007fbea2ce6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 85.074143][ T2022] RAX: ffffffffffffffda RBX: 00007fbea2015fa0 RCX: 00007fbea1d9c819 [ 85.074163][ T2022] RDX: 0000000000000000 RSI: 00000000400455c8 RDI: 0000000000000003 [ 85.074180][ T2022] RBP: 00007fbea2ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 85.074197][ T2022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 85.074213][ T2022] R13: 00007fbea2016038 R14: 00007fbea2015fa0 R15: 00007ffdd6cbc138 [ 85.074235][ T2022] [ 85.531920][ T2042] FAULT_INJECTION: forcing a failure. [ 85.531920][ T2042] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 85.545533][ T2042] CPU: 0 UID: 0 PID: 2042 Comm: syz.1.702 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 85.545586][ T2042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 85.545603][ T2042] Call Trace: [ 85.545613][ T2042] [ 85.545624][ T2042] __dump_stack+0x21/0x30 [ 85.545665][ T2042] dump_stack_lvl+0x140/0x1c0 [ 85.545697][ T2042] ? __cfi_dump_stack_lvl+0x10/0x10 [ 85.545730][ T2042] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 85.545762][ T2042] dump_stack+0x19/0x20 [ 85.545792][ T2042] should_fail_ex+0x3d7/0x530 [ 85.545825][ T2042] should_fail_alloc_page+0xec/0x110 [ 85.545851][ T2042] __alloc_pages_noprof+0x1c0/0x7e0 [ 85.545880][ T2042] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 85.545913][ T2042] __folio_alloc_noprof+0x14/0x80 [ 85.545942][ T2042] folio_prealloc+0x46/0x220 [ 85.545967][ T2042] do_pte_missing+0x169c/0x4410 [ 85.545996][ T2042] ? cgroup_rstat_updated+0x141/0x810 [ 85.546022][ T2042] ? pte_marker_clear+0x1b0/0x1b0 [ 85.546048][ T2042] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 85.546073][ T2042] ? walk_pgd_range+0x1b58/0x1c20 [ 85.546102][ T2042] ? __pte_offset_map+0x1b0/0x230 [ 85.546134][ T2042] ? pte_offset_map_rw_nolock+0xba/0x110 [ 85.546166][ T2042] handle_mm_fault+0x11b8/0x1bf0 [ 85.546188][ T2042] ? __kasan_check_write+0x18/0x20 [ 85.546224][ T2042] ? __cfi_handle_mm_fault+0x10/0x10 [ 85.546248][ T2042] ? follow_page_pte+0x4b9/0xbc0 [ 85.546277][ T2042] ? gup_must_unshare+0x1e0/0x1e0 [ 85.546305][ T2042] ? vma_is_secretmem+0x11/0x50 [ 85.546335][ T2042] __get_user_pages+0x1170/0x22b0 [ 85.546365][ T2042] ? populate_vma_page_range+0x220/0x220 [ 85.546391][ T2042] ? down_read+0x7f/0xe0 [ 85.546421][ T2042] ? __cfi_down_read+0x10/0x10 [ 85.546451][ T2042] __mm_populate+0x2f8/0x430 [ 85.546478][ T2042] do_mlock+0x7eb/0xa00 [ 85.546506][ T2042] ? fput+0x1a4/0x240 [ 85.546531][ T2042] ? lru_gen_add_folio+0x860/0x860 [ 85.546555][ T2042] ? ksys_write+0x1f3/0x260 [ 85.546591][ T2042] ? __cfi_ksys_write+0x10/0x10 [ 85.546625][ T2042] ? __kasan_check_read+0x15/0x20 [ 85.546653][ T2042] __x64_sys_mlock+0x64/0x80 [ 85.546677][ T2042] x64_sys_call+0x670/0x2ee0 [ 85.546711][ T2042] do_syscall_64+0x57/0xf0 [ 85.546747][ T2042] ? clear_bhb_loop+0x50/0xa0 [ 85.546773][ T2042] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 85.546811][ T2042] RIP: 0033:0x7fc3b959c819 [ 85.546834][ T2042] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 85.546857][ T2042] RSP: 002b:00007fc3ba494028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 85.546885][ T2042] RAX: ffffffffffffffda RBX: 00007fc3b9815fa0 RCX: 00007fc3b959c819 [ 85.546904][ T2042] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 85.546922][ T2042] RBP: 00007fc3ba494090 R08: 0000000000000000 R09: 0000000000000000 [ 85.546940][ T2042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 85.546956][ T2042] R13: 00007fc3b9816038 R14: 00007fc3b9815fa0 R15: 00007ffd7c95ca38 [ 85.546978][ T2042] [ 85.918757][ T36] kauditd_printk_skb: 358 callbacks suppressed [ 85.918782][ T36] audit: type=1400 audit(1776127339.440:2295): avc: denied { read write } for pid=293 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 85.962509][ T36] audit: type=1400 audit(1776127339.480:2296): avc: denied { read } for pid=2043 comm="syz.1.703" dev="nsfs" ino=4026532304 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 85.984763][ T36] audit: type=1400 audit(1776127339.500:2297): avc: denied { remount } for pid=2043 comm="syz.1.703" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=0 [ 86.010684][ T36] audit: type=1400 audit(1776127339.520:2298): avc: denied { read } for pid=2043 comm="syz.1.703" dev="nsfs" ino=4026532304 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 86.010700][ T12] Bluetooth: hci1: Frame reassembly failed (-84) [ 86.038299][ T36] audit: type=1400 audit(1776127339.520:2299): avc: denied { read } for pid=2043 comm="syz.1.703" dev="nsfs" ino=4026532304 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 86.059467][ T36] audit: type=1400 audit(1776127339.530:2300): avc: denied { create } for pid=2043 comm="syz.1.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 86.079310][ T36] audit: type=1400 audit(1776127339.600:2301): avc: denied { setattr } for pid=2043 comm="syz.1.703" name="ptmx" dev="devtmpfs" ino=24 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=0 [ 86.173087][ T36] audit: type=1400 audit(1776127339.690:2302): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.199559][ T36] audit: type=1400 audit(1776127339.690:2303): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 86.234123][ T36] audit: type=1400 audit(1776127339.740:2304): avc: denied { create } for pid=2048 comm="syz.0.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 86.912147][ T2068] FAULT_INJECTION: forcing a failure. [ 86.912147][ T2068] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 86.925555][ T2068] CPU: 0 UID: 0 PID: 2068 Comm: syz.0.711 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 86.925599][ T2068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 86.925618][ T2068] Call Trace: [ 86.925629][ T2068] [ 86.925640][ T2068] __dump_stack+0x21/0x30 [ 86.925684][ T2068] dump_stack_lvl+0x140/0x1c0 [ 86.925720][ T2068] ? __cfi_dump_stack_lvl+0x10/0x10 [ 86.925756][ T2068] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 86.925791][ T2068] dump_stack+0x19/0x20 [ 86.925832][ T2068] should_fail_ex+0x3d7/0x530 [ 86.925869][ T2068] should_fail_alloc_page+0xec/0x110 [ 86.925898][ T2068] __alloc_pages_noprof+0x1c0/0x7e0 [ 86.925931][ T2068] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 86.925969][ T2068] __folio_alloc_noprof+0x14/0x80 [ 86.926002][ T2068] folio_prealloc+0x46/0x220 [ 86.926030][ T2068] do_pte_missing+0x169c/0x4410 [ 86.926061][ T2068] ? cgroup_rstat_updated+0x141/0x810 [ 86.926090][ T2068] ? pte_marker_clear+0x1b0/0x1b0 [ 86.926118][ T2068] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 86.926145][ T2068] ? walk_pgd_range+0x1b58/0x1c20 [ 86.926178][ T2068] ? __pte_offset_map+0x1b0/0x230 [ 86.926213][ T2068] ? pte_offset_map_rw_nolock+0xba/0x110 [ 86.926249][ T2068] handle_mm_fault+0x11b8/0x1bf0 [ 86.926273][ T2068] ? __kasan_check_write+0x18/0x20 [ 86.926326][ T2068] ? __cfi_handle_mm_fault+0x10/0x10 [ 86.926350][ T2068] ? follow_page_pte+0x4b9/0xbc0 [ 86.926383][ T2068] ? gup_must_unshare+0x1e0/0x1e0 [ 86.926412][ T2068] ? vma_is_secretmem+0x11/0x50 [ 86.926446][ T2068] __get_user_pages+0x1170/0x22b0 [ 86.926482][ T2068] ? populate_vma_page_range+0x220/0x220 [ 86.926511][ T2068] ? down_read+0x7f/0xe0 [ 86.926544][ T2068] ? __cfi_down_read+0x10/0x10 [ 86.926577][ T2068] __mm_populate+0x2f8/0x430 [ 86.926612][ T2068] do_mlock+0x7eb/0xa00 [ 86.926642][ T2068] ? fput+0x1a4/0x240 [ 86.926679][ T2068] ? lru_gen_add_folio+0x860/0x860 [ 86.926708][ T2068] ? ksys_write+0x1f3/0x260 [ 86.926742][ T2068] ? __cfi_ksys_write+0x10/0x10 [ 86.926780][ T2068] ? __kasan_check_read+0x15/0x20 [ 86.926812][ T2068] __x64_sys_mlock+0x64/0x80 [ 86.926836][ T2068] x64_sys_call+0x670/0x2ee0 [ 86.926872][ T2068] do_syscall_64+0x57/0xf0 [ 86.926907][ T2068] ? clear_bhb_loop+0x50/0xa0 [ 86.926933][ T2068] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 86.926973][ T2068] RIP: 0033:0x7f46e039c819 [ 86.926995][ T2068] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 86.927019][ T2068] RSP: 002b:00007f46dedf7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 86.927048][ T2068] RAX: ffffffffffffffda RBX: 00007f46e0615fa0 RCX: 00007f46e039c819 [ 86.927069][ T2068] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 86.927087][ T2068] RBP: 00007f46dedf7090 R08: 0000000000000000 R09: 0000000000000000 [ 86.927105][ T2068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 86.927123][ T2068] R13: 00007f46e0616038 R14: 00007f46e0615fa0 R15: 00007ffd0a725178 [ 86.927148][ T2068] [ 87.230913][ T2047] Bluetooth: hci0: command 0x1003 tx timeout [ 87.237378][ T55] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 87.563171][ T2104] FAULT_INJECTION: forcing a failure. [ 87.563171][ T2104] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 87.576666][ T2104] CPU: 1 UID: 0 PID: 2104 Comm: syz.4.726 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 87.576706][ T2104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 87.576723][ T2104] Call Trace: [ 87.576732][ T2104] [ 87.576742][ T2104] __dump_stack+0x21/0x30 [ 87.576779][ T2104] dump_stack_lvl+0x140/0x1c0 [ 87.576811][ T2104] ? __cfi_dump_stack_lvl+0x10/0x10 [ 87.576844][ T2104] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 87.576876][ T2104] dump_stack+0x19/0x20 [ 87.576906][ T2104] should_fail_ex+0x3d7/0x530 [ 87.576938][ T2104] should_fail_alloc_page+0xec/0x110 [ 87.576964][ T2104] __alloc_pages_noprof+0x1c0/0x7e0 [ 87.576993][ T2104] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 87.577027][ T2104] __folio_alloc_noprof+0x14/0x80 [ 87.577057][ T2104] folio_prealloc+0x46/0x220 [ 87.577082][ T2104] do_pte_missing+0x169c/0x4410 [ 87.577111][ T2104] ? cgroup_rstat_updated+0x141/0x810 [ 87.577136][ T2104] ? pte_marker_clear+0x1b0/0x1b0 [ 87.577160][ T2104] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 87.577185][ T2104] ? walk_pgd_range+0x1b58/0x1c20 [ 87.577214][ T2104] ? __pte_offset_map+0x1b0/0x230 [ 87.577254][ T2104] ? pte_offset_map_rw_nolock+0xba/0x110 [ 87.577287][ T2104] handle_mm_fault+0x11b8/0x1bf0 [ 87.577309][ T2104] ? __kasan_check_write+0x18/0x20 [ 87.577344][ T2104] ? __cfi_handle_mm_fault+0x10/0x10 [ 87.577367][ T2104] ? follow_page_pte+0x4b9/0xbc0 [ 87.577396][ T2104] ? gup_must_unshare+0x1e0/0x1e0 [ 87.577424][ T2104] ? vma_is_secretmem+0x11/0x50 [ 87.577454][ T2104] __get_user_pages+0x1170/0x22b0 [ 87.577485][ T2104] ? populate_vma_page_range+0x220/0x220 [ 87.577512][ T2104] ? down_read+0x7f/0xe0 [ 87.577541][ T2104] ? __cfi_down_read+0x10/0x10 [ 87.577570][ T2104] __mm_populate+0x2f8/0x430 [ 87.577596][ T2104] do_mlock+0x7eb/0xa00 [ 87.577620][ T2104] ? fput+0x1a4/0x240 [ 87.577643][ T2104] ? lru_gen_add_folio+0x860/0x860 [ 87.577670][ T2104] ? ksys_write+0x1f3/0x260 [ 87.577700][ T2104] ? __cfi_ksys_write+0x10/0x10 [ 87.577730][ T2104] ? __kasan_check_read+0x15/0x20 [ 87.577762][ T2104] __x64_sys_mlock+0x64/0x80 [ 87.577786][ T2104] x64_sys_call+0x670/0x2ee0 [ 87.577817][ T2104] do_syscall_64+0x57/0xf0 [ 87.577853][ T2104] ? clear_bhb_loop+0x50/0xa0 [ 87.577877][ T2104] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 87.577915][ T2104] RIP: 0033:0x7fbea1d9c819 [ 87.577936][ T2104] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 87.577959][ T2104] RSP: 002b:00007fbea2ce6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 87.577987][ T2104] RAX: ffffffffffffffda RBX: 00007fbea2015fa0 RCX: 00007fbea1d9c819 [ 87.578007][ T2104] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 87.578024][ T2104] RBP: 00007fbea2ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 87.578041][ T2104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 87.578057][ T2104] R13: 00007fbea2016038 R14: 00007fbea2015fa0 R15: 00007ffdd6cbc138 [ 87.578080][ T2104] [ 88.086711][ T339] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 88.250817][ T2116] bridge0: port 3(veth0_to_bridge) entered blocking state [ 88.258109][ T2116] bridge0: port 3(veth0_to_bridge) entered disabled state [ 88.265442][ T2116] veth0_to_bridge: entered allmulticast mode [ 88.272528][ T2116] veth0_to_bridge: entered promiscuous mode [ 88.279253][ T2116] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 88.292057][ T2116] bridge0: port 3(veth0_to_bridge) entered blocking state [ 88.299280][ T2116] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 88.337013][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.349439][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.361702][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.374039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.386293][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.398544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.410789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.423102][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.435814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.448137][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 88.522999][ T2132] FAULT_INJECTION: forcing a failure. [ 88.522999][ T2132] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 88.552917][ T2132] CPU: 0 UID: 0 PID: 2132 Comm: syz.2.737 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 88.552958][ T2132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 88.552973][ T2132] Call Trace: [ 88.552982][ T2132] [ 88.552992][ T2132] __dump_stack+0x21/0x30 [ 88.553034][ T2132] dump_stack_lvl+0x140/0x1c0 [ 88.553065][ T2132] ? __cfi_dump_stack_lvl+0x10/0x10 [ 88.553100][ T2132] dump_stack+0x19/0x20 [ 88.553129][ T2132] should_fail_ex+0x3d7/0x530 [ 88.553168][ T2132] should_fail_alloc_page+0xec/0x110 [ 88.553194][ T2132] __alloc_pages_noprof+0x1c0/0x7e0 [ 88.553225][ T2132] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 88.553258][ T2132] __folio_alloc_noprof+0x14/0x80 [ 88.553286][ T2132] folio_prealloc+0x46/0x220 [ 88.553312][ T2132] do_pte_missing+0x169c/0x4410 [ 88.553340][ T2132] ? cgroup_rstat_updated+0x141/0x810 [ 88.553364][ T2132] ? pte_marker_clear+0x1b0/0x1b0 [ 88.553398][ T2132] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 88.553422][ T2132] ? walk_pgd_range+0x1b58/0x1c20 [ 88.553451][ T2132] ? __pte_offset_map+0x1b0/0x230 [ 88.553481][ T2132] ? pte_offset_map_rw_nolock+0xba/0x110 [ 88.553513][ T2132] handle_mm_fault+0x11b8/0x1bf0 [ 88.553534][ T2132] ? __kasan_check_write+0x18/0x20 [ 88.553571][ T2132] ? __cfi_handle_mm_fault+0x10/0x10 [ 88.553594][ T2132] ? follow_page_pte+0x4b9/0xbc0 [ 88.553623][ T2132] ? gup_must_unshare+0x1e0/0x1e0 [ 88.553650][ T2132] ? vma_is_secretmem+0x11/0x50 [ 88.553679][ T2132] __get_user_pages+0x1170/0x22b0 [ 88.553711][ T2132] ? populate_vma_page_range+0x220/0x220 [ 88.553736][ T2132] ? down_read+0x7f/0xe0 [ 88.553765][ T2132] ? __cfi_down_read+0x10/0x10 [ 88.553795][ T2132] __mm_populate+0x2f8/0x430 [ 88.553820][ T2132] do_mlock+0x7eb/0xa00 [ 88.553848][ T2132] ? fput+0x1a4/0x240 [ 88.553873][ T2132] ? lru_gen_add_folio+0x860/0x860 [ 88.553902][ T2132] ? ksys_write+0x1f3/0x260 [ 88.553935][ T2132] ? __cfi_ksys_write+0x10/0x10 [ 88.553969][ T2132] ? __kasan_check_read+0x15/0x20 [ 88.554001][ T2132] __x64_sys_mlock+0x64/0x80 [ 88.554028][ T2132] x64_sys_call+0x670/0x2ee0 [ 88.554062][ T2132] do_syscall_64+0x57/0xf0 [ 88.554098][ T2132] ? clear_bhb_loop+0x50/0xa0 [ 88.554123][ T2132] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 88.554160][ T2132] RIP: 0033:0x7ff87319c819 [ 88.554182][ T2132] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 88.554204][ T2132] RSP: 002b:00007ff873f73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 88.554231][ T2132] RAX: ffffffffffffffda RBX: 00007ff873415fa0 RCX: 00007ff87319c819 [ 88.554251][ T2132] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 88.554269][ T2132] RBP: 00007ff873f73090 R08: 0000000000000000 R09: 0000000000000000 [ 88.554285][ T2132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 88.554301][ T2132] R13: 00007ff873416038 R14: 00007ff873415fa0 R15: 00007ffdc5b57ce8 [ 88.554323][ T2132] [ 89.406945][ T2152] FAULT_INJECTION: forcing a failure. [ 89.406945][ T2152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 89.449518][ T2152] CPU: 0 UID: 0 PID: 2152 Comm: syz.4.746 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 89.449558][ T2152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 89.449576][ T2152] Call Trace: [ 89.449585][ T2152] [ 89.449595][ T2152] __dump_stack+0x21/0x30 [ 89.449637][ T2152] dump_stack_lvl+0x140/0x1c0 [ 89.449669][ T2152] ? __cfi_dump_stack_lvl+0x10/0x10 [ 89.449701][ T2152] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 89.449734][ T2152] dump_stack+0x19/0x20 [ 89.449764][ T2152] should_fail_ex+0x3d7/0x530 [ 89.449797][ T2152] should_fail_alloc_page+0xec/0x110 [ 89.449822][ T2152] __alloc_pages_noprof+0x1c0/0x7e0 [ 89.449852][ T2152] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 89.449886][ T2152] __folio_alloc_noprof+0x14/0x80 [ 89.449914][ T2152] folio_prealloc+0x46/0x220 [ 89.449941][ T2152] do_pte_missing+0x169c/0x4410 [ 89.449965][ T2152] ? finish_task_switch+0x1d9/0x760 [ 89.449996][ T2152] ? cgroup_rstat_updated+0x141/0x810 [ 89.450021][ T2152] ? pte_marker_clear+0x1b0/0x1b0 [ 89.450046][ T2152] ? __kasan_check_write+0x18/0x20 [ 89.450079][ T2152] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 89.450103][ T2152] ? irqentry_exit+0x4a/0x60 [ 89.450135][ T2152] ? __pte_offset_map+0x1b0/0x230 [ 89.450168][ T2152] ? pte_offset_map_rw_nolock+0xba/0x110 [ 89.450209][ T2152] handle_mm_fault+0x11b8/0x1bf0 [ 89.450232][ T2152] ? __kasan_check_write+0x18/0x20 [ 89.450268][ T2152] ? __cfi_handle_mm_fault+0x10/0x10 [ 89.450292][ T2152] ? follow_page_pte+0x4b9/0xbc0 [ 89.450321][ T2152] ? gup_must_unshare+0x1e0/0x1e0 [ 89.450349][ T2152] ? vma_is_secretmem+0x11/0x50 [ 89.450379][ T2152] __get_user_pages+0x1170/0x22b0 [ 89.450415][ T2152] ? populate_vma_page_range+0x220/0x220 [ 89.450441][ T2152] ? down_read+0x7f/0xe0 [ 89.450469][ T2152] ? __cfi_down_read+0x10/0x10 [ 89.450500][ T2152] __mm_populate+0x2f8/0x430 [ 89.450526][ T2152] do_mlock+0x7eb/0xa00 [ 89.450555][ T2152] ? fput+0x1a4/0x240 [ 89.450580][ T2152] ? lru_gen_add_folio+0x860/0x860 [ 89.450609][ T2152] ? ksys_write+0x1f3/0x260 [ 89.450642][ T2152] ? __cfi_ksys_write+0x10/0x10 [ 89.450676][ T2152] ? __kasan_check_read+0x15/0x20 [ 89.450709][ T2152] __x64_sys_mlock+0x64/0x80 [ 89.450736][ T2152] x64_sys_call+0x670/0x2ee0 [ 89.450770][ T2152] do_syscall_64+0x57/0xf0 [ 89.450805][ T2152] ? clear_bhb_loop+0x50/0xa0 [ 89.450830][ T2152] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 89.450866][ T2152] RIP: 0033:0x7fbea1d9c819 [ 89.450888][ T2152] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 89.450910][ T2152] RSP: 002b:00007fbea2ce6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 89.450937][ T2152] RAX: ffffffffffffffda RBX: 00007fbea2015fa0 RCX: 00007fbea1d9c819 [ 89.450956][ T2152] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 89.450974][ T2152] RBP: 00007fbea2ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 89.450991][ T2152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 89.451006][ T2152] R13: 00007fbea2016038 R14: 00007fbea2015fa0 R15: 00007ffdd6cbc138 [ 89.451028][ T2152] [ 89.452707][ T2154] netlink: 'syz.2.747': attribute type 29 has an invalid length. [ 89.776430][ T2154] netlink: 'syz.2.747': attribute type 3 has an invalid length. [ 89.785213][ T2154] netlink: 'syz.2.747': attribute type 4 has an invalid length. [ 89.810075][ T2154] netlink: 'syz.2.747': attribute type 6 has an invalid length. [ 89.826737][ T2154] netlink: 'syz.2.747': attribute type 7 has an invalid length. [ 89.842970][ T2154] netlink: 'syz.2.747': attribute type 5 has an invalid length. [ 89.853457][ T2154] netlink: 'syz.2.747': attribute type 15 has an invalid length. [ 89.862081][ T2154] netlink: 60942 bytes leftover after parsing attributes in process `syz.2.747'. [ 90.420829][ T2171] FAULT_INJECTION: forcing a failure. [ 90.420829][ T2171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 90.464838][ T2173] FAULT_INJECTION: forcing a failure. [ 90.464838][ T2173] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 90.478481][ T2171] CPU: 0 UID: 0 PID: 2171 Comm: syz.4.755 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 90.478525][ T2171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 90.478543][ T2171] Call Trace: [ 90.478552][ T2171] [ 90.478564][ T2171] __dump_stack+0x21/0x30 [ 90.478603][ T2171] dump_stack_lvl+0x140/0x1c0 [ 90.478636][ T2171] ? __cfi_dump_stack_lvl+0x10/0x10 [ 90.478668][ T2171] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 90.478700][ T2171] dump_stack+0x19/0x20 [ 90.478730][ T2171] should_fail_ex+0x3d7/0x530 [ 90.478763][ T2171] should_fail_alloc_page+0xec/0x110 [ 90.478788][ T2171] __alloc_pages_noprof+0x1c0/0x7e0 [ 90.478817][ T2171] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 90.478851][ T2171] __folio_alloc_noprof+0x14/0x80 [ 90.478879][ T2171] folio_prealloc+0x46/0x220 [ 90.478906][ T2171] do_pte_missing+0x169c/0x4410 [ 90.478933][ T2171] ? cgroup_rstat_updated+0x141/0x810 [ 90.478959][ T2171] ? pte_marker_clear+0x1b0/0x1b0 [ 90.478984][ T2171] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 90.479008][ T2171] ? walk_pgd_range+0x1b58/0x1c20 [ 90.479037][ T2171] ? __pte_offset_map+0x1b0/0x230 [ 90.479068][ T2171] ? pte_offset_map_rw_nolock+0xba/0x110 [ 90.479100][ T2171] handle_mm_fault+0x11b8/0x1bf0 [ 90.479122][ T2171] ? __kasan_check_write+0x18/0x20 [ 90.479159][ T2171] ? __cfi_handle_mm_fault+0x10/0x10 [ 90.479191][ T2171] ? follow_page_pte+0x4b9/0xbc0 [ 90.479220][ T2171] ? gup_must_unshare+0x1e0/0x1e0 [ 90.479247][ T2171] ? vma_is_secretmem+0x11/0x50 [ 90.479277][ T2171] __get_user_pages+0x1170/0x22b0 [ 90.479309][ T2171] ? populate_vma_page_range+0x220/0x220 [ 90.479334][ T2171] ? down_read+0x7f/0xe0 [ 90.479364][ T2171] ? __cfi_down_read+0x10/0x10 [ 90.479394][ T2171] __mm_populate+0x2f8/0x430 [ 90.479421][ T2171] do_mlock+0x7eb/0xa00 [ 90.479449][ T2171] ? fput+0x1a4/0x240 [ 90.479474][ T2171] ? lru_gen_add_folio+0x860/0x860 [ 90.479503][ T2171] ? ksys_write+0x1f3/0x260 [ 90.479536][ T2171] ? __cfi_ksys_write+0x10/0x10 [ 90.479570][ T2171] ? __kasan_check_read+0x15/0x20 [ 90.479602][ T2171] __x64_sys_mlock+0x64/0x80 [ 90.479628][ T2171] x64_sys_call+0x670/0x2ee0 [ 90.479661][ T2171] do_syscall_64+0x57/0xf0 [ 90.479696][ T2171] ? clear_bhb_loop+0x50/0xa0 [ 90.479720][ T2171] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 90.479758][ T2171] RIP: 0033:0x7fbea1d9c819 [ 90.479780][ T2171] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 90.479802][ T2171] RSP: 002b:00007fbea2ce6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 90.479830][ T2171] RAX: ffffffffffffffda RBX: 00007fbea2015fa0 RCX: 00007fbea1d9c819 [ 90.479850][ T2171] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 90.479868][ T2171] RBP: 00007fbea2ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 90.479885][ T2171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 90.479900][ T2171] R13: 00007fbea2016038 R14: 00007fbea2015fa0 R15: 00007ffdd6cbc138 [ 90.479923][ T2171] [ 91.348545][ T2173] CPU: 0 UID: 0 PID: 2173 Comm: syz.2.756 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 91.348590][ T2173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 91.348608][ T2173] Call Trace: [ 91.348617][ T2173] [ 91.348628][ T2173] __dump_stack+0x21/0x30 [ 91.348668][ T2173] dump_stack_lvl+0x140/0x1c0 [ 91.348700][ T2173] ? __cfi_dump_stack_lvl+0x10/0x10 [ 91.348733][ T2173] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 91.348766][ T2173] dump_stack+0x19/0x20 [ 91.348796][ T2173] should_fail_ex+0x3d7/0x530 [ 91.348829][ T2173] should_fail_alloc_page+0xec/0x110 [ 91.348855][ T2173] __alloc_pages_noprof+0x1c0/0x7e0 [ 91.348885][ T2173] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 91.348915][ T2173] ? __kasan_check_write+0x18/0x20 [ 91.348948][ T2173] ? __cfi_sched_clock_cpu+0x10/0x10 [ 91.348982][ T2173] ? __cfi___switch_to+0x10/0x10 [ 91.349016][ T2173] __folio_alloc_noprof+0x14/0x80 [ 91.349045][ T2173] folio_prealloc+0x46/0x220 [ 91.349071][ T2173] do_pte_missing+0x169c/0x4410 [ 91.349096][ T2173] ? finish_task_switch+0x139/0x760 [ 91.349125][ T2173] ? __schedule+0x13a1/0x1fa0 [ 91.349151][ T2173] ? pte_marker_clear+0x1b0/0x1b0 [ 91.349177][ T2173] ? __kasan_check_write+0x18/0x20 [ 91.349209][ T2173] ? _raw_spin_lock+0x92/0x120 [ 91.349243][ T2173] ? __cfi__raw_spin_lock+0x10/0x10 [ 91.349287][ T2173] ? __pte_offset_map+0x1b0/0x230 [ 91.349318][ T2173] ? pte_offset_map_rw_nolock+0xba/0x110 [ 91.349350][ T2173] handle_mm_fault+0x11b8/0x1bf0 [ 91.349372][ T2173] ? __kasan_check_write+0x18/0x20 [ 91.349408][ T2173] ? __cfi_handle_mm_fault+0x10/0x10 [ 91.349431][ T2173] ? follow_page_pte+0x4b9/0xbc0 [ 91.349460][ T2173] ? gup_must_unshare+0x1e0/0x1e0 [ 91.349487][ T2173] ? vma_is_secretmem+0x11/0x50 [ 91.349518][ T2173] __get_user_pages+0x1170/0x22b0 [ 91.349553][ T2173] ? populate_vma_page_range+0x220/0x220 [ 91.349578][ T2173] ? down_read+0x7f/0xe0 [ 91.349607][ T2173] ? __cfi_down_read+0x10/0x10 [ 91.349637][ T2173] __mm_populate+0x2f8/0x430 [ 91.349664][ T2173] do_mlock+0x7eb/0xa00 [ 91.349693][ T2173] ? fput+0x1a4/0x240 [ 91.349718][ T2173] ? lru_gen_add_folio+0x860/0x860 [ 91.349746][ T2173] ? ksys_write+0x1f3/0x260 [ 91.349779][ T2173] ? __cfi_ksys_write+0x10/0x10 [ 91.349813][ T2173] ? __kasan_check_read+0x15/0x20 [ 91.349845][ T2173] __x64_sys_mlock+0x64/0x80 [ 91.349872][ T2173] x64_sys_call+0x670/0x2ee0 [ 91.349906][ T2173] do_syscall_64+0x57/0xf0 [ 91.349940][ T2173] ? clear_bhb_loop+0x50/0xa0 [ 91.349967][ T2173] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 91.350005][ T2173] RIP: 0033:0x7ff87319c819 [ 91.350027][ T2173] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 91.350050][ T2173] RSP: 002b:00007ff873f73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 91.350077][ T2173] RAX: ffffffffffffffda RBX: 00007ff873415fa0 RCX: 00007ff87319c819 [ 91.350097][ T2173] RDX: 0000000000000000 RSI: 0000000000074390 RDI: 0000200000000000 [ 91.350114][ T2173] RBP: 00007ff873f73090 R08: 0000000000000000 R09: 0000000000000000 [ 91.350132][ T2173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 91.350148][ T2173] R13: 00007ff873416038 R14: 00007ff873415fa0 R15: 00007ffdc5b57ce8 [ 91.350170][ T2173] [ 92.561216][ T36] kauditd_printk_skb: 143 callbacks suppressed [ 92.561254][ T36] audit: type=1400 audit(1776127345.230:2448): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.015856][ T36] audit: type=1400 audit(1776127346.350:2449): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.346652][ C0] net_ratelimit: 99118 callbacks suppressed [ 93.346678][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 93.346707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 93.352954][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 93.364939][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 93.376808][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 93.388934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 93.401088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 93.412877][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 93.424802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 93.437487][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 95.227989][ T36] audit: type=1400 audit(1776127346.590:2450): avc: denied { read write } for pid=532 comm="syz-executor" name="loop4" dev="devtmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 97.275025][ T36] audit: type=1400 audit(1776127347.440:2451): avc: denied { create } for pid=2174 comm="syz.2.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=0 [ 98.356660][ C1] net_ratelimit: 164841 callbacks suppressed [ 98.356689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 98.356718][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 98.363082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 98.375086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 98.388177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 98.399015][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 98.410972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 98.423331][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 98.435295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 98.447402][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 98.508869][ T36] audit: type=1400 audit(1776127347.460:2452): avc: denied { create } for pid=2174 comm="syz.2.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 99.020762][ T36] audit: type=1400 audit(1776127347.460:2453): avc: denied { create } for pid=2174 comm="syz.2.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 99.837810][ T36] audit: type=1400 audit(1776127347.460:2454): avc: denied { create } for pid=2174 comm="syz.2.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 100.707452][ T36] audit: type=1400 audit(1776127347.460:2455): avc: denied { create } for pid=2174 comm="syz.2.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 100.812369][ T2203] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.947489][ T2202] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.954074][ T2202] audit: audit_lost=43 audit_rate_limit=0 audit_backlog_limit=64 [ 101.078283][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 101.084896][ T291] audit: audit_lost=44 audit_rate_limit=0 audit_backlog_limit=64 [ 101.318530][ T36] audit: type=1400 audit(1776127348.160:2456): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.366650][ C1] net_ratelimit: 161623 callbacks suppressed [ 103.366676][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 103.366697][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 103.372993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 103.385056][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 103.406986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 103.409095][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 103.421185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 103.433160][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 103.445069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 103.457128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.481559][ C1] sched: DL replenish lagged too much [ 108.376663][ C1] net_ratelimit: 170224 callbacks suppressed [ 108.376693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 108.376706][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 108.376839][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 108.383207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 108.395399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 108.407412][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 108.419432][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 108.431555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 108.443819][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 108.455798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 113.386639][ C0] net_ratelimit: 171639 callbacks suppressed [ 113.386674][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 113.386676][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 113.386884][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 113.393262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 113.405010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 113.416943][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 113.429416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 113.441335][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 113.453299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 113.465324][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 118.396619][ C0] net_ratelimit: 168962 callbacks suppressed [ 118.396650][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 118.396677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 118.403074][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 118.415347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 118.427242][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 118.439420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 118.451278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 118.463136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 118.475369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 118.487627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 120.653120][ T36] kauditd_printk_skb: 135 callbacks suppressed [ 120.653149][ T36] audit: type=1400 audit(1776127374.170:2522): avc: denied { execmem } for pid=2209 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 121.877082][ T36] audit: type=1400 audit(1776127374.970:2523): avc: denied { execmem } for pid=2210 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 123.406655][ C1] net_ratelimit: 164661 callbacks suppressed [ 123.406687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 123.406701][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 123.407155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 123.413263][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 123.425496][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 123.437542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 123.449903][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 123.461913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 123.473821][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 123.486047][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 123.589663][ T36] audit: type=1400 audit(1776127375.810:2524): avc: denied { execmem } for pid=2211 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 124.217826][ T36] audit: type=1400 audit(1776127377.610:2525): avc: denied { execmem } for pid=2212 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 128.416650][ C1] net_ratelimit: 164539 callbacks suppressed [ 128.416678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 128.416709][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 128.422958][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 128.435393][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 128.447392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 128.459245][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 128.471225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 128.483763][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 128.495708][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 128.507542][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 130.088695][ T36] audit: type=1400 audit(1776127383.600:2526): avc: denied { execmem } for pid=2213 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 132.844177][ T36] audit: type=1400 audit(1776127386.360:2527): avc: denied { execmem } for pid=2215 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 133.426655][ C0] net_ratelimit: 163946 callbacks suppressed [ 133.426682][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 133.426728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 133.433246][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 133.445463][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 133.457553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 133.469425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 133.481537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 133.493826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 133.505947][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 133.518854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 134.342239][ T36] audit: type=1400 audit(1776127386.390:2528): avc: denied { execmem } for pid=2217 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 138.436623][ C1] net_ratelimit: 166918 callbacks suppressed [ 138.436652][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 138.436660][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 138.436964][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 138.443052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 138.454953][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 138.467156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 138.479120][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 138.491209][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 138.503094][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 138.515049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 138.578746][ T36] audit: type=1400 audit(1776127386.710:2529): avc: denied { execmem } for pid=2214 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 140.183723][ T36] audit: type=1400 audit(1776127388.030:2530): avc: denied { execmem } for pid=2218 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 143.267923][ T36] audit: type=1400 audit(1776127388.290:2531): avc: denied { execmem } for pid=2219 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 143.446630][ C0] net_ratelimit: 163708 callbacks suppressed [ 143.446659][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 143.446674][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 143.446948][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 143.453039][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 143.465263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 143.477520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 143.489338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 143.501213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 143.513511][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 143.526047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 144.141134][ T36] audit: type=1400 audit(1776127397.660:2532): avc: denied { execmem } for pid=2221 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 147.881995][ T36] audit: type=1400 audit(1776127401.400:2533): avc: denied { execmem } for pid=2220 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 148.456639][ C1] net_ratelimit: 161689 callbacks suppressed [ 148.456666][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 148.456676][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 148.456961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 148.462984][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 148.475054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 148.487432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 148.499118][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 148.511141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 148.523096][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 148.535805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 153.466621][ C0] net_ratelimit: 123800 callbacks suppressed [ 153.466654][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.466688][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 153.472968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.485109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 153.497187][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.509694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 153.521038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.532998][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 153.545458][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 153.557847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 158.476606][ C0] net_ratelimit: 119402 callbacks suppressed [ 158.476632][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.476660][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 158.482915][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.494857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 158.506997][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.519205][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 158.531093][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.543271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 158.554920][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 158.566863][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 163.486624][ C0] net_ratelimit: 131551 callbacks suppressed [ 163.486655][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 163.486680][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 163.493114][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 163.505354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 163.517692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 163.529464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 163.541720][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 163.554005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 163.565527][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 163.577691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 165.901872][ T36] audit: type=1400 audit(1776127419.410:2534): avc: denied { execmem } for pid=2223 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 168.496649][ C1] net_ratelimit: 131087 callbacks suppressed [ 168.496679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 168.496708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.502997][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 168.515420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.527675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 168.539396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.551502][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 168.563313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 168.575097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 168.587593][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 172.634400][ T36] audit: type=1400 audit(1776127426.150:2535): avc: denied { execmem } for pid=2224 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 173.506596][ C1] net_ratelimit: 130296 callbacks suppressed [ 173.506621][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 173.506654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.513330][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 173.525117][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.537241][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 173.548996][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.561104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 173.573124][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 173.585594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 173.597076][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 175.699089][ T36] audit: type=1400 audit(1776127429.170:2536): avc: denied { execmem } for pid=2225 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 177.996287][ T36] audit: type=1400 audit(1776127431.510:2537): avc: denied { execmem } for pid=2226 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 178.516590][ C0] net_ratelimit: 129047 callbacks suppressed [ 178.516616][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 178.516756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 178.522950][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 178.535019][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 178.547065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 178.559435][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 178.571059][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 178.583236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 178.595246][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 178.607122][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 180.768192][ T36] audit: type=1400 audit(1776127432.680:2538): avc: denied { execmem } for pid=2228 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 183.526617][ C1] net_ratelimit: 131186 callbacks suppressed [ 183.526646][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 183.526690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 183.533252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 183.545052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 183.557502][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 183.569165][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 183.581531][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 183.593630][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 183.606059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 183.617751][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 184.666682][ T36] audit: type=1400 audit(1776127433.290:2539): avc: denied { execmem } for pid=2227 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 187.361795][ T36] audit: type=1400 audit(1776127440.880:2540): avc: denied { execmem } for pid=2229 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 188.536658][ C0] net_ratelimit: 128763 callbacks suppressed [ 188.536688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 188.536710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 188.543323][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 188.555972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 188.567693][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 188.579927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 188.591879][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 188.603864][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 188.616075][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 188.628894][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 189.845055][ T36] audit: type=1400 audit(1776127443.360:2541): avc: denied { execmem } for pid=2232 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 190.017065][ T36] audit: type=1400 audit(1776127443.390:2542): avc: denied { execmem } for pid=2230 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 191.088454][ T36] audit: type=1400 audit(1776127443.480:2543): avc: denied { execmem } for pid=2233 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 191.988689][ T36] audit: type=1400 audit(1776127443.840:2544): avc: denied { execmem } for pid=2234 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 193.546625][ C0] net_ratelimit: 128208 callbacks suppressed [ 193.546655][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 193.546658][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 193.547129][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 193.552975][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 193.565305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 193.577452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 193.589313][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 193.601457][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 193.613818][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 193.625527][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 194.912196][ T36] audit: type=1400 audit(1776127445.470:2545): avc: denied { execmem } for pid=2236 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 196.598973][ T36] audit: type=1400 audit(1776127445.560:2546): avc: denied { execmem } for pid=2235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 196.779983][ T36] audit: type=1400 audit(1776127447.470:2547): avc: denied { execmem } for pid=2237 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 198.327792][ T36] audit: type=1400 audit(1776127448.800:2548): avc: denied { execmem } for pid=2238 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 198.556604][ C0] net_ratelimit: 130897 callbacks suppressed [ 198.556630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 198.556631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 198.557082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 198.562886][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 198.574877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 198.586964][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 198.599175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 198.610968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 198.623072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 198.634813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 201.970064][ T36] audit: type=1400 audit(1776127455.490:2549): avc: denied { execmem } for pid=2239 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 203.566611][ C0] net_ratelimit: 132078 callbacks suppressed [ 203.566635][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.566642][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 203.567100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 203.572854][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.584893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 203.596958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.609193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 203.621025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.633244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 203.644895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.576601][ C1] net_ratelimit: 132557 callbacks suppressed [ 208.576633][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.576668][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.583418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 208.594874][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.607450][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 208.619123][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.630884][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 208.643161][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 208.655557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 208.667254][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.573116][ T36] audit: type=1400 audit(1776127467.090:2550): avc: denied { execmem } for pid=2240 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 213.586624][ C0] net_ratelimit: 130921 callbacks suppressed [ 213.586677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.592678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 213.598851][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.611125][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 213.622675][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.635350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 213.647231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.659060][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 213.671152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 213.683352][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 215.165640][ T36] audit: type=1400 audit(1776127468.680:2551): avc: denied { execmem } for pid=2241 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 215.847139][ T36] audit: type=1400 audit(1776127469.270:2552): avc: denied { execmem } for pid=2242 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 216.507369][ T36] audit: type=1400 audit(1776127469.700:2553): avc: denied { execmem } for pid=2243 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 217.377296][ T36] audit: type=1400 audit(1776127470.400:2554): avc: denied { execmem } for pid=2244 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 218.596621][ C0] net_ratelimit: 130109 callbacks suppressed [ 218.596674][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.596710][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 218.602854][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.615185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 218.627025][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.638849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 218.650976][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.663272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 218.674862][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 218.686997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 219.388637][ T36] audit: type=1400 audit(1776127472.820:2555): avc: denied { execmem } for pid=2245 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 219.476884][ T36] audit: type=1400 audit(1776127472.970:2556): avc: denied { execmem } for pid=2246 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 223.606601][ C1] net_ratelimit: 131467 callbacks suppressed [ 223.606625][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 223.606628][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.606800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.612951][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 223.625026][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.637228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 223.649160][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.661424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 223.673116][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 223.685002][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 228.616615][ C0] net_ratelimit: 135415 callbacks suppressed [ 228.616640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.616672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 228.622973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.634869][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 228.646930][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.659432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 228.671124][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.683219][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 228.695118][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 228.706965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 228.919087][ T37] INFO: task syz.4.762:2184 blocked for more than 123 seconds. [ 228.937553][ T37] Not tainted syzkaller #0 [ 228.942544][ T37] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 229.648954][ T37] task:syz.4.762 state:D stack:0 pid:2184 tgid:2184 ppid:532 flags:0x00004000 [ 230.019400][ T37] Call Trace: [ 230.022767][ T37] [ 230.025740][ T37] __schedule+0x1399/0x1fa0 [ 230.030508][ T37] ? __sched_text_start+0x10/0x10 [ 230.035577][ T37] ? __cfi_percpu_ref_switch_to_atomic_rcu+0x10/0x10 [ 230.042361][ T37] ? __call_rcu_common+0x43b/0x720 [ 230.047639][ T37] schedule+0xc5/0x240 [ 230.051781][ T37] schedule_timeout+0xc7/0x3b0 [ 230.056768][ T37] ? __cfi_schedule_timeout+0x10/0x10 [ 230.062201][ T37] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 230.067836][ T37] ? __percpu_ref_switch_mode+0x358/0x5e0 [ 230.073609][ T37] wait_for_common+0x369/0x650 [ 230.078453][ T37] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 230.084494][ T37] ? wait_for_completion+0x40/0x40 [ 230.089750][ T37] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 230.095618][ T37] ? percpu_ref_kill_and_confirm+0xf4/0x220 [ 230.101591][ T37] ? kill_ioctx+0x2b0/0x3d0 [ 230.106257][ T37] wait_for_completion+0x1c/0x40 [ 230.111297][ T37] exit_aio+0x2ec/0x3c0 [ 230.115537][ T37] ? __cfi_exit_aio+0x10/0x10 [ 230.120340][ T37] ? uprobe_clear_state+0x2cd/0x340 [ 230.125615][ T37] __mmput+0x30/0x340 [ 230.129704][ T37] ? mmput+0x4d/0x170 [ 230.133747][ T37] mmput+0x55/0x170 [ 230.137623][ T37] do_exit+0x909/0x2720 [ 230.141843][ T37] ? kmem_cache_free+0x4b3/0x4f0 [ 230.146866][ T37] ? preempt_schedule_common+0x2d/0x60 [ 230.152382][ T37] ? __cfi_do_exit+0x10/0x10 [ 230.157048][ T37] ? preempt_schedule+0xc5/0xe0 [ 230.161942][ T37] ? __cfi_preempt_schedule+0x10/0x10 [ 230.167456][ T37] ? __kasan_check_write+0x18/0x20 [ 230.172627][ T37] do_group_exit+0x229/0x2f0 [ 230.177289][ T37] __x64_sys_exit_group+0x43/0x50 [ 230.182375][ T37] x64_sys_call+0x2ed2/0x2ee0 [ 230.187144][ T37] do_syscall_64+0x57/0xf0 [ 230.191617][ T37] ? clear_bhb_loop+0x50/0xa0 [ 230.196463][ T37] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 230.202448][ T37] RIP: 0033:0x7fbea1d9c819 [ 230.207031][ T37] RSP: 002b:00007ffdd6cbc478 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 230.215677][ T37] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbea1d9c819 [ 230.223737][ T37] RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 [ 230.231795][ T37] RBP: 00007ffdd6cbc4dc R08: 0000000000000000 R09: 00000000000927c0 [ 230.239840][ T37] R10: 0000000000000006 R11: 0000000000000246 R12: 00000000000000b8 [ 230.247898][ T37] R13: 00000000000927c0 R14: 00000000000174bc R15: 00007ffdd6cbc530 [ 230.255928][ T37] [ 230.298124][ T37] NMI backtrace for cpu 1 [ 230.298152][ T37] CPU: 1 UID: 0 PID: 37 Comm: khungtaskd Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 230.298187][ T37] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 230.298204][ T37] Call Trace: [ 230.298213][ T37] [ 230.298225][ T37] __dump_stack+0x21/0x30 [ 230.298265][ T37] dump_stack_lvl+0x140/0x1c0 [ 230.298297][ T37] ? __cfi_dump_stack_lvl+0x10/0x10 [ 230.298332][ T37] dump_stack+0x19/0x20 [ 230.298362][ T37] nmi_cpu_backtrace+0x2ba/0x2d0 [ 230.298399][ T37] ? rcu_read_unlock_special+0xb7/0x420 [ 230.298431][ T37] ? __cfi_nmi_cpu_backtrace+0x10/0x10 [ 230.298466][ T37] ? sched_show_task+0x371/0x530 [ 230.298497][ T37] ? __rcu_read_unlock+0xc0/0xc0 [ 230.298527][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 230.298558][ T37] ? __cfi_nmi_raise_cpu_backtrace+0x10/0x10 [ 230.298589][ T37] nmi_trigger_cpumask_backtrace+0x142/0x2c0 [ 230.298627][ T37] arch_trigger_cpumask_backtrace+0x14/0x20 [ 230.298658][ T37] watchdog+0xdad/0xf00 [ 230.298681][ T37] ? __kasan_check_write+0x18/0x20 [ 230.298717][ T37] ? __cfi_watchdog+0x10/0x10 [ 230.298739][ T37] ? __kasan_check_read+0x15/0x20 [ 230.298778][ T37] ? __kthread_parkme+0x137/0x180 [ 230.298816][ T37] ? schedule+0xc5/0x240 [ 230.298840][ T37] kthread+0x2c6/0x370 [ 230.298865][ T37] ? __cfi_watchdog+0x10/0x10 [ 230.298887][ T37] ? __cfi_kthread+0x10/0x10 [ 230.298912][ T37] ret_from_fork+0x67/0xa0 [ 230.298945][ T37] ? __cfi_kthread+0x10/0x10 [ 230.298970][ T37] ret_from_fork_asm+0x1a/0x30 [ 230.299007][ T37] [ 230.299016][ T37] Sending NMI from CPU 1 to CPUs 0: [ 230.508919][ C0] NMI backtrace for cpu 0 [ 230.508944][ C0] CPU: 0 UID: 0 PID: 33 Comm: rcuop/1 Not tainted syzkaller #0 962c4f53752c25f9427fc034aff9bf9776e8b502 [ 230.508968][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 230.508986][ C0] RIP: 0010:find_match+0xbb/0x10e0 [ 230.509022][ C0] Code: 74 08 48 89 df e8 75 8d e6 fc 48 89 d8 bb c0 00 00 00 48 03 18 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 <74> 08 48 89 df e8 4b 8d e6 fc 48 8b 1b 48 85 db 0f 84 e5 0b 00 00 [ 230.509037][ C0] RSP: 0018:ffffc90000006c38 EFLAGS: 00000246 [ 230.509053][ C0] RAX: 1ffff11020474018 RBX: ffff8881023a00c0 RCX: dffffc0000000000 [ 230.509066][ C0] RDX: ffff88810367b900 RSI: 0000000000000000 RDI: 0000000000000000 [ 230.509078][ C0] RBP: ffffc90000006cf0 R08: ffffc90000006f80 R09: ffffc90000006f90 [ 230.509091][ C0] R10: ffffc900000070f0 R11: fffff52000000e22 R12: 0000000000000001 [ 230.509104][ C0] R13: 1ffff11021cf5f98 R14: 0000000000000003 R15: 0000000000000000 [ 230.509115][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 230.509130][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 230.509141][ C0] CR2: 00007efc3e74ab60 CR3: 000000010b314000 CR4: 00000000003526b0 [ 230.509157][ C0] Call Trace: [ 230.509163][ C0] [ 230.509172][ C0] ? net_rx_action+0x5ea/0xd80 [ 230.509197][ C0] ? stack_depot_save_flags+0x38/0x800 [ 230.509222][ C0] __find_rr_leaf+0x24e/0x840 [ 230.509248][ C0] ? rt6_check_expired+0x250/0x250 [ 230.509272][ C0] ? __siphash_unaligned+0x276/0x3c0 [ 230.509295][ C0] fib6_table_lookup+0x2ee/0x9e0 [ 230.509315][ C0] ? __cfi_flow_hash_from_keys+0x10/0x10 [ 230.509338][ C0] ? __cfi_fib6_table_lookup+0x10/0x10 [ 230.509357][ C0] ? enqueue_to_backlog+0x786/0xbe0 [ 230.509379][ C0] ? skb_network_protocol+0x529/0x780 [ 230.509417][ C0] ip6_pol_route+0x17a/0x1360 [ 230.509438][ C0] ? __cfi_ip6_pol_route+0x10/0x10 [ 230.509457][ C0] ? skb_scrub_packet+0x26a/0x3d0 [ 230.509477][ C0] ? __dev_forward_skb2+0x4ad/0x770 [ 230.509494][ C0] ? veth_xmit+0x790/0xb20 [ 230.509521][ C0] ip6_pol_route_input+0x5a/0x80 [ 230.509542][ C0] fib6_rule_lookup+0x4ee/0x6d0 [ 230.509559][ C0] ? __cfi_ip6_pol_route_input+0x10/0x10 [ 230.509579][ C0] ? __cfi_fib6_rule_lookup+0x10/0x10 [ 230.509614][ C0] ? ip6t_do_table+0x1e0/0x14d0 [ 230.509638][ C0] ip6_route_input+0x62e/0x8f0 [ 230.509658][ C0] ? __cfi_ip6_route_input+0x10/0x10 [ 230.509679][ C0] ? __cfi_ip6t_do_table+0x10/0x10 [ 230.509707][ C0] ? __cfi_ip6table_mangle_hook+0x10/0x10 [ 230.509732][ C0] ip6_rcv_finish+0x15a/0x3e0 [ 230.509753][ C0] ipv6_rcv+0xf1/0x240 [ 230.509772][ C0] ? __cfi_ipv6_rcv+0x10/0x10 [ 230.509790][ C0] ? br_dev_queue_push_xmit+0x55c/0x700 [ 230.509815][ C0] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 230.509834][ C0] ? __cfi_br_dev_queue_push_xmit+0x10/0x10 [ 230.509858][ C0] netif_receive_skb+0x147/0x7b0 [ 230.509880][ C0] ? __cfi_netif_receive_skb+0x10/0x10 [ 230.509900][ C0] ? br_flood+0x67e/0x730 [ 230.509923][ C0] br_pass_frame_up+0x126/0x1b0 [ 230.509938][ C0] br_handle_frame_finish+0x1317/0x1760 [ 230.509965][ C0] ? __cfi_br_handle_frame_finish+0x10/0x10 [ 230.509999][ C0] br_handle_frame+0x5a6/0xba0 [ 230.510015][ C0] ? __cfi_br_handle_frame+0x10/0x10 [ 230.510030][ C0] __netif_receive_skb_core+0xfae/0x3ab0 [ 230.510051][ C0] ? ip6_mc_input+0x516/0x6c0 [ 230.510070][ C0] ? sk_skb_reason_drop+0xd8/0x310 [ 230.510093][ C0] ? __cfi_ip6_mc_input+0x10/0x10 [ 230.510113][ C0] ? qdisc_run_end+0x120/0x120 [ 230.510132][ C0] ? ip6_rcv_finish+0x360/0x3e0 [ 230.510151][ C0] ? ipv6_rcv+0xf1/0x240 [ 230.510169][ C0] ? __cfi_ipv6_rcv+0x10/0x10 [ 230.510187][ C0] ? __cfi_ip6_rcv_finish+0x10/0x10 [ 230.510205][ C0] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 230.510229][ C0] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 230.510252][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 230.510277][ C0] process_backlog+0x3e5/0xad0 [ 230.510300][ C0] __napi_poll+0xd0/0x610 [ 230.510319][ C0] net_rx_action+0x5ea/0xd80 [ 230.510341][ C0] ? __cfi_net_rx_action+0x10/0x10 [ 230.510361][ C0] ? sched_clock+0x44/0x60 [ 230.510383][ C0] ? __cfi_sched_clock_cpu+0x10/0x10 [ 230.510405][ C0] ? irqtime_account_irq+0x51/0x1c0 [ 230.510427][ C0] handle_softirqs+0x1ad/0x630 [ 230.510453][ C0] __do_softirq+0xf/0x16 [ 230.510469][ C0] do_softirq+0xb8/0x110 [ 230.510491][ C0] [ 230.510497][ C0] [ 230.510503][ C0] ? __cfi_do_softirq+0x10/0x10 [ 230.510526][ C0] ? kmem_cache_free+0x1bd/0x4f0 [ 230.510551][ C0] ? __d_free+0x27/0x30 [ 230.510576][ C0] ? __cfi___d_free+0x10/0x10 [ 230.510599][ C0] __local_bh_enable_ip+0x74/0x80 [ 230.510622][ C0] rcu_do_batch+0x5d9/0xd40 [ 230.510649][ C0] ? rcu_core+0xd30/0xd30 [ 230.510670][ C0] ? __kasan_check_write+0x18/0x20 [ 230.510693][ C0] ? _raw_spin_lock+0x92/0x120 [ 230.510715][ C0] ? _raw_spin_unlock_irqrestore+0x4a/0x70 [ 230.510743][ C0] ? __kasan_check_read+0x15/0x20 [ 230.510763][ C0] ? rcu_nocb_cb_kthread+0x50f/0xb30 [ 230.510788][ C0] rcu_nocb_cb_kthread+0x524/0xb30 [ 230.510814][ C0] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 230.510838][ C0] ? __kasan_check_write+0x18/0x20 [ 230.510859][ C0] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 230.510883][ C0] ? __cfi__raw_spin_lock_irqsave+0x10/0x10 [ 230.510907][ C0] ? _raw_spin_lock_irqsave+0xc1/0x160 [ 230.510932][ C0] ? set_cpus_allowed_ptr+0xa1/0xf0 [ 230.510948][ C0] ? __cfi_set_cpus_allowed_ptr+0x10/0x10 [ 230.510964][ C0] ? __kasan_check_read+0x15/0x20 [ 230.510990][ C0] ? __kthread_parkme+0x137/0x180 [ 230.511016][ C0] ? schedule+0xc5/0x240 [ 230.511032][ C0] kthread+0x2c6/0x370 [ 230.511049][ C0] ? __cfi_rcu_nocb_cb_kthread+0x10/0x10 [ 230.511073][ C0] ? __cfi_kthread+0x10/0x10 [ 230.511089][ C0] ret_from_fork+0x67/0xa0 [ 230.511110][ C0] ? __cfi_kthread+0x10/0x10 [ 230.511126][ C0] ret_from_fork_asm+0x1a/0x30 [ 230.511152][ C0] [ 233.039338][ T36] audit: type=1400 audit(1776127486.470:2557): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[1492]" dev="pipefs" ino=1492 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 233.626560][ C0] net_ratelimit: 111352 callbacks suppressed [ 233.626595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.626898][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 233.633029][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.644825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 233.656973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.669289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 233.680939][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.693261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 233.704975][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 233.716889][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 234.087406][ T36] audit: type=1400 audit(1776127486.470:2558): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[1492]" dev="pipefs" ino=1492 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 235.449130][ T36] audit: type=1400 audit(1776127486.470:2559): avc: denied { write } for pid=283 comm="syz-executor" path="pipe:[1492]" dev="pipefs" ino=1492 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 238.636563][ C1] net_ratelimit: 127433 callbacks suppressed [ 238.636587][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 238.636601][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.636801][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.643187][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 238.654977][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.667200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0) [ 238.678964][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.691009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 238.702934][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 238.715302][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:ce:44:80:ff:3b:05, vlan:0)