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"}) ioctl$BTRFS_IOC_INO_LOOKUP(r10, 0xd0009412, &(0x7f0000001200)={r12, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {r13, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}], 0x81, "7464fbe08eb369"}) (async, rerun: 64) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000067700)={0x0, 0x0, "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", "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"}) (async, rerun: 64) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000068700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000068900)={0x8b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r12, r16}, {0x0, r17}], 0x9, "8553d0b4d4c1c3"}) ioctl$HIDIOCGFIELDINFO(r1, 0xc038480a, &(0x7f0000000040)={0x3, 0x200, 0x200, 0x81, 0x0, 0x2b1, 0x9, 0x81, 0xe4, 0x4, 0x7, 0xffffffe1, 0x1, 0xedbe}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="1801f0ffde2b950000000000255f7487e8721cf11ae2000000"], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r18 = creat(&(0x7f0000000080)='./bus\x00', 0x8a) ftruncate(r18, 0x800) lseek(r18, 0x200, 0x0) (async) r19 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r18, r19, 0x0, 0x10000) 07:18:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00'}, 0x10) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r0, r1, 0x0, 0x10000) 07:18:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(0x0, 0x0) 07:18:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 07:18:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='f2fs_readpages\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:38 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00'}, 0x10) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r0, r1, 0x0, 0x10000) 07:18:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(0x0, 0x0) 07:18:39 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x700000000000000}, 0x0) 07:18:39 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(0x0, 0x0) 07:18:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='f2fs_readpages\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) pipe2(&(0x7f00000000c0), 0x4800) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='f2fs_readpages\x00', r0}, 0x10) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) ftruncate(r1, 0x800) (async) lseek(r1, 0x200, 0x0) (async) open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) (async) sendfile(r1, r2, 0x0, 0x10000) (async) 07:18:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(0x0, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) 07:18:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='f2fs_readpages\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) pipe2(&(0x7f00000000c0), 0x4800) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='f2fs_readpages\x00', r0}, 0x10) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) ftruncate(r1, 0x800) (async) lseek(r1, 0x200, 0x0) (async) open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) (async) sendfile(r1, r2, 0x0, 0x10000) (async) 07:18:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:39 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x900000000000000}, 0x0) 07:18:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:39 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:18:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 07:18:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x0) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:40 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0xa00000000000000}, 0x0) 07:18:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:40 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(0xffffffffffffffff, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x19000000}, 0x0) 07:18:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:41 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x1900000000000000}, 0x0) 07:18:41 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(0x0, 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:41 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r0, r1, 0x0, 0x10000) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000066700)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "a7f503866d93db"}) r5 = fsmount(0xffffffffffffffff, 0x0, 0x70) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "7464fbe08eb369"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005a940)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "5daef661d5323d"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r11 = socket$netlink(0x10, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r11, 0x8983, &(0x7f0000000040)) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r10, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r11, 0x8982, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0xfe01}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001800)={0x0, r12, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP(r10, 0xd0009412, &(0x7f0000001200)={r12, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {r13, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}], 0x81, "7464fbe08eb369"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000067700)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000068700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000068900)={0x8b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r12, r16}, {0x0, r17}], 0x9, "8553d0b4d4c1c3"}) ioctl$HIDIOCGFIELDINFO(r1, 0xc038480a, &(0x7f0000000040)={0x3, 0x200, 0x200, 0x81, 0x0, 0x2b1, 0x9, 0x81, 0xe4, 0x4, 0x7, 0xffffffe1, 0x1, 0xedbe}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="1801f0ffde2b950000000000255f7487e8721cf11ae2000000"], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r18 = creat(&(0x7f0000000080)='./bus\x00', 0x8a) ftruncate(r18, 0x800) lseek(r18, 0x200, 0x0) r19 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r18, r19, 0x0, 0x10000) 07:18:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(0x0, 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(0x0, 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x88290000}, 0x0) 07:18:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:42 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x930e000000000000}, 0x0) 07:18:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:42 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:42 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(0xffffffffffffffff, r0, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:42 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(0xffffffffffffffff, r0, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:42 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(0xffffffffffffffff, r0, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) 07:18:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 07:18:43 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 07:18:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:43 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) 07:18:43 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:43 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) 07:18:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:43 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) 07:18:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:43 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) 07:18:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xefffffff}, 0x0) 07:18:44 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0xefffffff00000000}, 0x0) 07:18:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:44 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000) 07:18:44 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:44 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x0) 07:18:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:44 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x0) 07:18:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(0xffffffffffffffff, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:44 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x0) 07:18:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 07:18:45 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 07:18:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(0xffffffffffffffff, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:45 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:45 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(0xffffffffffffffff, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:45 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(0xffffffffffffffff, r0, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 07:18:46 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 07:18:46 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(0xffffffffffffffff, r0, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x200, 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r0, r1, 0x0, 0x10000) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000066700)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "a7f503866d93db"}) r5 = fsmount(0xffffffffffffffff, 0x0, 0x70) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x81, "7464fbe08eb369"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005a940)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1f, "5daef661d5323d"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r11 = socket$netlink(0x10, 0x3, 0x2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r11, 0x8983, &(0x7f0000000040)) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r10, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00', {}, 0x40}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r11, 0x8982, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0xfe01}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r11, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001800)={0x0, r12, "02b66c11beed7c64705a2327ec95767e4393a580b2c3043a2fcfb08839b8897467f4a525091f0f7d2480b2fbdcfd2a3924b674e8aed38628fb035a463934e151ef7c0289d4fd7b308135026f77657ca78a849330727be579703bef5f51cf16a7198f8eb8e962cc55e47a88645dc99b6e4dfd15399b64e979124ef3a9120208d05d9de3ff1ce9cc9e6353b97b13c914e3530a6ec5b967674f3cbc69538c66356f6777af618dd96e1730048727e164fcc8139776c1e5061154ffe7838008ce90ccbf0827c03a28016d5f3bdabbc98bee9c405509e3e094ba1677d6b347061c346722828810ba1b68424c585770f6527f3856630aedb97f2ee0742e013d5d412046", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP(r10, 0xd0009412, &(0x7f0000001200)={r12, 0x100000000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000745c0)={0x5af, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {r13, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}], 0x81, "7464fbe08eb369"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000067700)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000068700)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000068900)={0x8b, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {r12, r16}, {0x0, r17}], 0x9, "8553d0b4d4c1c3"}) ioctl$HIDIOCGFIELDINFO(r1, 0xc038480a, &(0x7f0000000040)={0x3, 0x200, 0x200, 0x81, 0x0, 0x2b1, 0x9, 0x81, 0xe4, 0x4, 0x7, 0xffffffe1, 0x1, 0xedbe}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="1801f0ffde2b950000000000255f7487e8721cf11ae2000000"], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r18 = creat(&(0x7f0000000080)='./bus\x00', 0x8a) ftruncate(r18, 0x800) lseek(r18, 0x200, 0x0) r19 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r18, r19, 0x0, 0x10000) 07:18:46 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[0xffffffffffffffff]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r4, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r5, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r6, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r4, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r4, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x800) lseek(r7, 0x200, 0x0) r8 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r7, r8, 0x0, 0x10000) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) writev(r9, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(0xffffffffffffffff, r0, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(0x0, 0x0) 07:18:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 07:18:46 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 07:18:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(0x0, 0x0) 07:18:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:46 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[0xffffffffffffffff]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r4, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r5, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r6, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r4, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r4, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x800) lseek(r7, 0x200, 0x0) r8 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r7, r8, 0x0, 0x10000) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) writev(r9, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(0xffffffffffffffff, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(0x0, 0x0) 07:18:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(0xffffffffffffffff, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffffef}, 0x0) 07:18:47 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x0) 07:18:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(0xffffffffffffffff, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:18:47 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[0xffffffffffffffff]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r4, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r5, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r6, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r4, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r4, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r7, 0x800) lseek(r7, 0x200, 0x0) r8 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r7, r8, 0x0, 0x10000) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) writev(r9, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:18:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x700, 0x80, 0x62, 0x7, {{0x21, 0x4, 0x2, 0x1, 0x84, 0x65, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x4b, 0x3, [{0x7, 0x9, "b2d15108253a2c"}, {0x1, 0x3, ']'}, {0x1, 0x12, "c2ad54da2662a78a01d028f27d1bc2e3"}, {0x0, 0x5, "7723d0"}, {0x2, 0x11, "ae659eef619ac447e058c4d25fc1dd"}, {0x7, 0x11, "592e2fd40b95f439e2753bfcad4a91"}]}, @timestamp_addr={0x44, 0x24, 0x9b, 0x1, 0x2, [{@multicast2, 0x1}, {@empty, 0x7fff}, {@broadcast, 0x7}, {@loopback, 0x1}]}, @end]}}}}}) r1 = open(&(0x7f0000000380)='./file0\x00', 0x80000, 0x80) sendto$packet(r1, &(0x7f0000000180)="535e6043f152dea82d27c3c11a06a1ea1b42d596bcd6dfaa5d30d7e5396c3de3399b6498ef0b2eb772cf935a521407e5383d9c684d745f72cbe4eafe04fcbb658a517eee9bb6874c4889a7cbd3c6175169fef4", 0x53, 0xc0, &(0x7f0000000200)={0x11, 0x4, r0, 0x1, 0x4, 0x6, @random="eafb22199af1"}, 0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) dup2(r2, r4) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x700, 0x80, 0x62, 0x7, {{0x21, 0x4, 0x2, 0x1, 0x84, 0x65, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x4b, 0x3, [{0x7, 0x9, "b2d15108253a2c"}, {0x1, 0x3, ']'}, {0x1, 0x12, "c2ad54da2662a78a01d028f27d1bc2e3"}, {0x0, 0x5, "7723d0"}, {0x2, 0x11, "ae659eef619ac447e058c4d25fc1dd"}, {0x7, 0x11, "592e2fd40b95f439e2753bfcad4a91"}]}, @timestamp_addr={0x44, 0x24, 0x9b, 0x1, 0x2, [{@multicast2, 0x1}, {@empty, 0x7fff}, {@broadcast, 0x7}, {@loopback, 0x1}]}, @end]}}}}}) r1 = open(&(0x7f0000000380)='./file0\x00', 0x80000, 0x80) sendto$packet(r1, &(0x7f0000000180)="535e6043f152dea82d27c3c11a06a1ea1b42d596bcd6dfaa5d30d7e5396c3de3399b6498ef0b2eb772cf935a521407e5383d9c684d745f72cbe4eafe04fcbb658a517eee9bb6874c4889a7cbd3c6175169fef4", 0x53, 0xc0, &(0x7f0000000200)={0x11, 0x4, r0, 0x1, 0x4, 0x6, @random="eafb22199af1"}, 0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) dup2(r2, r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x48, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000005000000000000000001000011d68100ffffffff152a0000ffffffffc017fcff000000000400000000000000", @ANYRESOCT=r2], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x7, &(0x7f00000004c0)=""/7, 0x41000, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000500)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0xfffffffc, 0x8, 0x3022, 0x6}, 0x10}, 0x80) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 07:18:48 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x2}, 0x0) 07:18:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(0x0, 0x0) 07:18:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x700, 0x80, 0x62, 0x7, {{0x21, 0x4, 0x2, 0x1, 0x84, 0x65, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x4b, 0x3, [{0x7, 0x9, "b2d15108253a2c"}, {0x1, 0x3, ']'}, {0x1, 0x12, "c2ad54da2662a78a01d028f27d1bc2e3"}, {0x0, 0x5, "7723d0"}, {0x2, 0x11, "ae659eef619ac447e058c4d25fc1dd"}, {0x7, 0x11, "592e2fd40b95f439e2753bfcad4a91"}]}, @timestamp_addr={0x44, 0x24, 0x9b, 0x1, 0x2, [{@multicast2, 0x1}, {@empty, 0x7fff}, {@broadcast, 0x7}, {@loopback, 0x1}]}, @end]}}}}}) r1 = open(&(0x7f0000000380)='./file0\x00', 0x80000, 0x80) sendto$packet(r1, &(0x7f0000000180)="535e6043f152dea82d27c3c11a06a1ea1b42d596bcd6dfaa5d30d7e5396c3de3399b6498ef0b2eb772cf935a521407e5383d9c684d745f72cbe4eafe04fcbb658a517eee9bb6874c4889a7cbd3c6175169fef4", 0x53, 0xc0, &(0x7f0000000200)={0x11, 0x4, r0, 0x1, 0x4, 0x6, @random="eafb22199af1"}, 0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) dup2(r2, r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x48, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000005000000000000000001000011d68100ffffffff152a0000ffffffffc017fcff000000000400000000000000", @ANYRESOCT=r2], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x7, &(0x7f00000004c0)=""/7, 0x41000, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000500)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0xfffffffc, 0x8, 0x3022, 0x6}, 0x10}, 0x80) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x700, 0x80, 0x62, 0x7, {{0x21, 0x4, 0x2, 0x1, 0x84, 0x65, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x4b, 0x3, [{0x7, 0x9, "b2d15108253a2c"}, {0x1, 0x3, ']'}, {0x1, 0x12, "c2ad54da2662a78a01d028f27d1bc2e3"}, {0x0, 0x5, "7723d0"}, {0x2, 0x11, "ae659eef619ac447e058c4d25fc1dd"}, {0x7, 0x11, "592e2fd40b95f439e2753bfcad4a91"}]}, @timestamp_addr={0x44, 0x24, 0x9b, 0x1, 0x2, [{@multicast2, 0x1}, {@empty, 0x7fff}, {@broadcast, 0x7}, {@loopback, 0x1}]}, @end]}}}}}) r1 = open(&(0x7f0000000380)='./file0\x00', 0x80000, 0x80) sendto$packet(r1, &(0x7f0000000180)="535e6043f152dea82d27c3c11a06a1ea1b42d596bcd6dfaa5d30d7e5396c3de3399b6498ef0b2eb772cf935a521407e5383d9c684d745f72cbe4eafe04fcbb658a517eee9bb6874c4889a7cbd3c6175169fef4", 0x53, 0xc0, &(0x7f0000000200)={0x11, 0x4, r0, 0x1, 0x4, 0x6, @random="eafb22199af1"}, 0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) dup2(r2, r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x48, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000005000000000000000001000011d68100ffffffff152a0000ffffffffc017fcff000000000400000000000000", @ANYRESOCT=r2], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x7, &(0x7f00000004c0)=""/7, 0x41000, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000500)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0xfffffffc, 0x8, 0x3022, 0x6}, 0x10}, 0x80) creat(&(0x7f0000000040)='./bus\x00', 0x0) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:48 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x700, 0x80, 0x62, 0x7, {{0x21, 0x4, 0x2, 0x1, 0x84, 0x65, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x4b, 0x3, [{0x7, 0x9, "b2d15108253a2c"}, {0x1, 0x3, ']'}, {0x1, 0x12, "c2ad54da2662a78a01d028f27d1bc2e3"}, {0x0, 0x5, "7723d0"}, {0x2, 0x11, "ae659eef619ac447e058c4d25fc1dd"}, {0x7, 0x11, "592e2fd40b95f439e2753bfcad4a91"}]}, @timestamp_addr={0x44, 0x24, 0x9b, 0x1, 0x2, [{@multicast2, 0x1}, {@empty, 0x7fff}, {@broadcast, 0x7}, {@loopback, 0x1}]}, @end]}}}}}) r1 = open(&(0x7f0000000380)='./file0\x00', 0x80000, 0x80) sendto$packet(r1, &(0x7f0000000180)="535e6043f152dea82d27c3c11a06a1ea1b42d596bcd6dfaa5d30d7e5396c3de3399b6498ef0b2eb772cf935a521407e5383d9c684d745f72cbe4eafe04fcbb658a517eee9bb6874c4889a7cbd3c6175169fef4", 0x53, 0xc0, &(0x7f0000000200)={0x11, 0x4, r0, 0x1, 0x4, 0x6, @random="eafb22199af1"}, 0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) dup2(r2, r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x48, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000005000000000000000001000011d68100ffffffff152a0000ffffffffc017fcff000000000400000000000000", @ANYRESOCT=r2], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x7, &(0x7f00000004c0)=""/7, 0x41000, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000500)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0xfffffffc, 0x8, 0x3022, 0x6}, 0x10}, 0x80) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x800) lseek(r5, 0x200, 0x0) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(0x0, 0x0) 07:18:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x700, 0x80, 0x62, 0x7, {{0x21, 0x4, 0x2, 0x1, 0x84, 0x65, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x4b, 0x3, [{0x7, 0x9, "b2d15108253a2c"}, {0x1, 0x3, ']'}, {0x1, 0x12, "c2ad54da2662a78a01d028f27d1bc2e3"}, {0x0, 0x5, "7723d0"}, {0x2, 0x11, "ae659eef619ac447e058c4d25fc1dd"}, {0x7, 0x11, "592e2fd40b95f439e2753bfcad4a91"}]}, @timestamp_addr={0x44, 0x24, 0x9b, 0x1, 0x2, [{@multicast2, 0x1}, {@empty, 0x7fff}, {@broadcast, 0x7}, {@loopback, 0x1}]}, @end]}}}}}) r1 = open(&(0x7f0000000380)='./file0\x00', 0x80000, 0x80) sendto$packet(r1, &(0x7f0000000180)="535e6043f152dea82d27c3c11a06a1ea1b42d596bcd6dfaa5d30d7e5396c3de3399b6498ef0b2eb772cf935a521407e5383d9c684d745f72cbe4eafe04fcbb658a517eee9bb6874c4889a7cbd3c6175169fef4", 0x53, 0xc0, &(0x7f0000000200)={0x11, 0x4, r0, 0x1, 0x4, 0x6, @random="eafb22199af1"}, 0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) dup2(r2, r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x48, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000005000000000000000001000011d68100ffffffff152a0000ffffffffc017fcff000000000400000000000000", @ANYRESOCT=r2], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x7, &(0x7f00000004c0)=""/7, 0x41000, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000500)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0xfffffffc, 0x8, 0x3022, 0x6}, 0x10}, 0x80) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x800) lseek(r5, 0x200, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(0x0, 0x0) 07:18:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(0x0, 0x0) 07:18:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000080)={'erspan0\x00', 0x0, 0x700, 0x80, 0x62, 0x7, {{0x21, 0x4, 0x2, 0x1, 0x84, 0x65, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@cipso={0x86, 0x4b, 0x3, [{0x7, 0x9, "b2d15108253a2c"}, {0x1, 0x3, ']'}, {0x1, 0x12, "c2ad54da2662a78a01d028f27d1bc2e3"}, {0x0, 0x5, "7723d0"}, {0x2, 0x11, "ae659eef619ac447e058c4d25fc1dd"}, {0x7, 0x11, "592e2fd40b95f439e2753bfcad4a91"}]}, @timestamp_addr={0x44, 0x24, 0x9b, 0x1, 0x2, [{@multicast2, 0x1}, {@empty, 0x7fff}, {@broadcast, 0x7}, {@loopback, 0x1}]}, @end]}}}}}) r1 = open(&(0x7f0000000380)='./file0\x00', 0x80000, 0x80) sendto$packet(r1, &(0x7f0000000180)="535e6043f152dea82d27c3c11a06a1ea1b42d596bcd6dfaa5d30d7e5396c3de3399b6498ef0b2eb772cf935a521407e5383d9c684d745f72cbe4eafe04fcbb658a517eee9bb6874c4889a7cbd3c6175169fef4", 0x53, 0xc0, &(0x7f0000000200)={0x11, 0x4, r0, 0x1, 0x4, 0x6, @random="eafb22199af1"}, 0x14) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) dup2(r2, r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x48, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000005000000000000000001000011d68100ffffffff152a0000ffffffffc017fcff000000000400000000000000", @ANYRESOCT=r2], &(0x7f0000000480)='syzkaller\x00', 0x7, 0x7, &(0x7f00000004c0)=""/7, 0x41000, 0x10, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000500)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0xfffffffc, 0x8, 0x3022, 0x6}, 0x10}, 0x80) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r5, 0x800) lseek(r5, 0x200, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) syz_clone3(&(0x7f0000000580)={0x8000100, 0x0, 0x0, &(0x7f0000000140), {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x2) 07:18:49 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x3}, 0x0) 07:18:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f00000002c0)=""/18, 0x0}, 0x58) 07:18:49 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) 07:18:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, 0x0, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:18:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:49 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xb2000000) 07:18:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x3) 07:18:50 executing program 1: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x6, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x0) 07:18:50 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) 07:18:50 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r0, r1, 0x0) dup2(r0, r2) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="34040000000000000100100000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT], 0x58}}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000003880)="f5d5c89a1e06cac452e49b5e6b3667a559e69eac5c9c9c3128d189e47b8fd1fecc3b8298eb1855aee5e1b4f1b14d956613a349a70adb5ead06bdd399d615e3da4b2377443d2093eebab0bef2244469af24afc25d64c5ba8f500829be5faaf4aade59e362f9a30dfadf0f3779bb5ff22a6a7d419a946a102f4be74d152129885c9dd8471c37e889d4ef17", 0x8a}], 0x1}}], 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/213, 0xd5}], 0x1}, 0x20}], 0x1, 0x40000003, &(0x7f0000000200)) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000900)={&(0x7f00000002c0)=ANY=[@ANYBLOB="08060000240001002dbd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="080003001000f2ff06000b000800010061746d004c0108801c0001000807fffffdffffff01000000010000007f0000000100000006000200f60300001c000100813fa30e0800000003000000ac00000002000000040000000c000200e7007f00070005001c000100e27447006e00000003000000000000000100000006000000100002000300020005001f00fcff00001c000100093f0010080001000100000009000000ff0300000200000008000200010008001c00010081093f00000001000100000009000000d97600000a000000180002000500950301f84efaff0763060400ff070010ffff1c0001000509040005000000020000000500000004000000030000000a00020003000000080000001c0001000181008000000000000000000001000044090000050000000e0002000400090048a00600020000001c000100803f0900526600000200000001000000040000000100000006000200070000000600050080fa000008000100746266000804020004040300ff0f0000ff000000ff0f00004a09000009000000307d000006000000406000000000010001ffffff06000000090000007f0000001f00000064ec0000080000000004000008000000060000000400000007000000070000009e0c000009000000970b0000ffff000007000000bb0000003f0000006b000000700000000200000001000000d80400003f00000001000000e0000000000000000400000007000000090000003b0000000000000005000000000000b70400000004000000080000000400000052000000ffffffffff0000000500000005000000060000000500000007000000fbffffff65f6d038ffffff7f4000000022f0000009000000010000000300000001000000ffffff7f010000000800000000000000c1754e2a1f0000004d000000060000000104000005000000030000000500000047c1000084000000c37d0000030000000000000093100000f6020000010000000400000005000000ffffff7f0500000001000000080000007500000000020000040000000200000000000080018000000100008047070000010400001f0000000100000004000000420000000300000002000000020000000200000093030000bc07000004000000040000004e080000af000000040000000008000009000000000000001f0000000700000008000000090000004000000051190000050000000080000000000000070000000010000006000000ffffffff010000008100000043690000020000000200000000000018b144000080000000f8ffffff020000000ad800000000000005000000000000000100008000000000060000000300000000001800040000000100000005000000ff7f000055000000ff0f00000000000009000000ff0f0000b80000000000000008000000ff0f00007f0000000300000005000000080000004000000012e50000faffffffff0000000010000000000000010400000600000008000000010001000900000002000000020000008100000001000000810000000700000005000000290000000400000005000000840d00000300000000000000fcffffff0100010009000000dd0a000007000000a80e000001000100480e00001f000000030000000900000006000000ff7fffff070000007affffff0000010060000000000000807f0000000600000008000000800000001f0000000600000005000000400000009eab00000900000003000000c92400004000000000080000010001000400000000100000f8ffffff800000000600000096fdffff00010000050000003384330f4809000000080000060000002b0e00000200000001040000fbffffff03000000ffffff7f3f00000007000000070000000500000007000000ff7f0000ff0f00000500000027c100001d080000040000000a37000001ffffff060005007f050000060005000933000008000d00ffffffff08000d0000100000500008801c000100fff800010700000002000000ff010000070000000100000006000200080000001c000100ff06060009000000010000000700000001000000030000000a00020004000101ff03000008000e00ff0f0000"], 0x608}, 0x1, 0x0, 0x0, 0x8}, 0x5) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000240)) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) dup3(r6, r7, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r10, 0xae60) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) dup3(r9, r10, 0x0) dup2(r9, r11) dup2(r0, r11) syz_kvm_setup_cpu$x86(r4, r8, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000a00)=[@text32={0x20, &(0x7f0000000980)="dcbec60a0000f20f2107c4c1f85ad50f7800660fc7b2629f000066baf80cb8bed76980ef66bafc0c66b85ef266ef0fedd76766f30fa7e8b8e2d300000f23d00f21f835000000040f23f8c4e2f934f5", 0x4f}], 0x1, 0x23, &(0x7f0000000a40)=[@efer={0x2, 0x8800}, @efer={0x2, 0x9000}], 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 2074.942450][T26683] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=2147483648 (4294967296 ns) > initial count (234 ns). Using initial count to start timer. 07:18:50 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) dup3(r0, r1, 0x0) dup2(r0, r2) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="34040000000000000100100000000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT], 0x58}}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000003880)="f5d5c89a1e06cac452e49b5e6b3667a559e69eac5c9c9c3128d189e47b8fd1fecc3b8298eb1855aee5e1b4f1b14d956613a349a70adb5ead06bdd399d615e3da4b2377443d2093eebab0bef2244469af24afc25d64c5ba8f500829be5faaf4aade59e362f9a30dfadf0f3779bb5ff22a6a7d419a946a102f4be74d152129885c9dd8471c37e889d4ef17", 0x8a}], 0x1}}], 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/213, 0xd5}], 0x1}, 0x20}], 0x1, 0x40000003, &(0x7f0000000200)) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000900)={&(0x7f00000002c0)=ANY=[@ANYBLOB="08060000240001002dbd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x608}, 0x1, 0x0, 0x0, 0x8}, 0x5) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000240)) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) dup3(r6, r7, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r10, 0xae60) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) dup3(r9, r10, 0x0) dup2(r9, r11) dup2(r0, r11) syz_kvm_setup_cpu$x86(r4, r8, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000a00)=[@text32={0x20, &(0x7f0000000980)="dcbec60a0000f20f2107c4c1f85ad50f7800660fc7b2629f000066baf80cb8bed76980ef66bafc0c66b85ef266ef0fedd76766f30fa7e8b8e2d300000f23d00f21f835000000040f23f8c4e2f934f5", 0x4f}], 0x1, 0x23, &(0x7f0000000a40)=[@efer={0x2, 0x8800}, @efer={0x2, 0x9000}], 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 07:18:50 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000240)=0x1) r1 = socket(0x10, 0x2, 0x0) r2 = getpid() r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmmsg$unix(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000000)="ab", 0x1}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, r5}}}], 0x20}}], 0x1, 0x0) r6 = socket(0x10, 0x2, 0x0) getpid() r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r11, 0xae60) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) dup3(r10, r11, 0x0) dup2(r10, r12) sendmmsg$unix(r6, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000000)="ab", 0x1}, {&(0x7f00000003c0)="a194357894c69129e1c88a84d3ae56d8dc06fabf019e395ca3a939f0c52000b763c869825ea981554ddd688c638fe624125a54dca08d4eb28ffe81a385e22e0faa6435bd1929fbd2e961a98436762b1333f4ab2d0fe3c3a432414cc71a97fe6495d42aac3843e530b6cd3e", 0x6b}, {&(0x7f0000000440)="05b8b2c44c0053b146360b7f19d0ca0afe3cc81b9ee5556f4c696e8618fda1adef3c4be8f11a5bdf73ea53d01874b7a57411f0983888ba3472e2bb4b3fa9e0999c01d12f275d16d6f6455633df48a2a66605cc5e1182275d6e", 0x59}, {&(0x7f0000000540)="c2860a67df5d85b4a5fa4f5b6fcead6be9fddc54c8a950796fae5d2346c09a50a9011f2b1114d5d6b3970fa1590aa4ac2330710afcd03640232e92729ac52383492f53c973048dbbd36a0abc7f525e3300bdee91be945631f26f42999bef5b1b181f6d99f2834721eb1a6ed2e0530d445f7ad4d2cafd4d69833a3f8444b53e775744b8667df38ca47b075f7f4601634b953a9a7bbcf3256f0f4851372787baa3900abb0e29144a4e8d60c9e33f00000000000000", 0xb4}], 0x4, &(0x7f00000002c0), 0x0, 0x40011}}], 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003740)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000023"], 0x58}}, {{0x0, 0x0, &(0x7f0000003a00)=[{&(0x7f0000003880)="f5d5c89a1e069e4d31672ef71acac452e49b5e6b3667a559e69eac5c9c9c3128d189e47b8fd1fecc3b8298eb1855aee5e1b4f1b14d956613a349a70adb5ead06bdd399d315e3da4b2377443d2093eebab0bef2244469af24afc25d64c5ba8f500829be5faaf4aade59e362f9a30dfadf0f3779bb5ff22a6a7d419a946a102f4be74d152129885c9dd8471c37e889d4ef17", 0x91}], 0x1}}, {{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd3f4eb6c31febeaaebe75d1baca2679cf61b429aab3d30601d33b79c8858149c84b85ef687756fb009db6e4c6c9b63903a0350f9ff5f3306464fee639fabd5b2da68a5bd42e17d8", 0x48}, {&(0x7f0000000180)="baac675381de855d51f440f7ad94876dd9b3e5c76fa776128c72b63047534bdf34a31695241d9c204b5c9fa054628d4bdcbccf744e8b1e559c886c21cfff538766769d613ea76aaa62b63e9276b83494ce286081860a4aec40b4e7199c92170ad43ccbe30f7975660aefff0a5583fa6da4a7001a4c94a8600a64887ee960df547c9db40b157da5a3559a73a27f192b3f653a15744f8ab8a7e7bb4f68d48e759e2cbb85d4b01b2c91f58d06fcd853242f87c00fa6d1e6cb4e96f5cebe3caf6ff1d43af2a2233f087939e02a7bf7b4ab22a6c2e09034368dd6aee887d23fb4dc", 0xdf}], 0x2, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, r5}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, r9}}}], 0x40, 0x44000000}}], 0x3, 0x0) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r14, 0xae60) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) r16 = syz_clone3(&(0x7f0000000880)={0x40000000, &(0x7f00000004c0), &(0x7f0000000600), &(0x7f0000000640), {0x3a}, &(0x7f0000000680)=""/176, 0xb0, &(0x7f0000000740)=""/228, &(0x7f0000000840)=[r4, 0x0, r4, r8], 0x4}, 0x58) sched_setscheduler(r16, 0x9896a1979cd28cca, &(0x7f0000000900)=0x720a) ioctl$KVM_GET_VCPU_EVENTS(r15, 0x4400ae8f, &(0x7f0000003700)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r15, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 07:18:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x4) [ 2075.406254][T26706] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=2147483648 (4294967296 ns) > initial count (234 ns). Using initial count to start timer. 07:18:51 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:51 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x83000000) 07:18:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 07:18:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) [ 2075.705152][T26723] FAULT_INJECTION: forcing a failure. [ 2075.705152][T26723] name fail_usercopy, interval 1, probability 0, space 0, times 0 07:18:51 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x5}, 0x0) [ 2075.749626][T26723] CPU: 0 PID: 26723 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2075.759694][T26723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2075.769587][T26723] Call Trace: [ 2075.772714][T26723] [ 2075.775494][T26723] dump_stack_lvl+0x151/0x1b7 [ 2075.780003][T26723] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2075.785301][T26723] dump_stack+0x15/0x17 [ 2075.789290][T26723] should_fail+0x3c0/0x510 [ 2075.793544][T26723] should_fail_usercopy+0x1a/0x20 [ 2075.798405][T26723] _copy_from_user+0x20/0xd0 [ 2075.802832][T26723] copy_clone_args_from_user+0x1c7/0x790 [ 2075.808299][T26723] ? preempt_count_add+0x90/0x1a0 [ 2075.813164][T26723] ? dup_mmap+0xea0/0xea0 [ 2075.817325][T26723] ? file_end_write+0x1b0/0x1b0 [ 2075.822012][T26723] __x64_sys_clone3+0x122/0x3a0 [ 2075.826702][T26723] ? __mutex_lock_slowpath+0x10/0x10 [ 2075.831827][T26723] ? __ia32_sys_clone+0x300/0x300 [ 2075.836685][T26723] ? ksys_write+0x25f/0x2c0 [ 2075.841027][T26723] ? debug_smp_processor_id+0x17/0x20 [ 2075.846231][T26723] do_syscall_64+0x44/0xd0 [ 2075.850508][T26723] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2075.856207][T26723] RIP: 0033:0x7f8f8bc980c9 [ 2075.860471][T26723] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2075.879907][T26723] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2075.888278][T26723] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2075.896087][T26723] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2075.903900][T26723] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2075.911714][T26723] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2075.919527][T26723] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2075.927339][T26723] [ 2075.934682][T26732] FAULT_INJECTION: forcing a failure. [ 2075.934682][T26732] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2075.948127][T26732] CPU: 1 PID: 26732 Comm: syz-executor.2 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2075.958188][T26732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2075.968088][T26732] Call Trace: [ 2075.971202][T26732] [ 2075.973981][T26732] dump_stack_lvl+0x151/0x1b7 [ 2075.978754][T26732] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2075.984050][T26732] ? irqentry_exit+0x30/0x40 [ 2075.988481][T26732] dump_stack+0x15/0x17 [ 2075.992556][T26732] should_fail+0x3c0/0x510 [ 2075.996810][T26732] should_fail_usercopy+0x1a/0x20 [ 2076.001668][T26732] _copy_from_user+0x20/0xd0 [ 2076.006096][T26732] copy_clone_args_from_user+0x1c7/0x790 [ 2076.011563][T26732] ? preempt_count_add+0x90/0x1a0 [ 2076.016422][T26732] ? dup_mmap+0xea0/0xea0 [ 2076.020590][T26732] ? file_end_write+0x1b0/0x1b0 [ 2076.025276][T26732] __x64_sys_clone3+0x122/0x3a0 [ 2076.029989][T26732] ? __mutex_lock_slowpath+0x10/0x10 [ 2076.035083][T26732] ? __ia32_sys_clone+0x300/0x300 [ 2076.039946][T26732] ? ksys_write+0x25f/0x2c0 [ 2076.044285][T26732] ? debug_smp_processor_id+0x17/0x20 [ 2076.049492][T26732] do_syscall_64+0x44/0xd0 [ 2076.053744][T26732] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2076.059470][T26732] RIP: 0033:0x7fe2b86160c9 [ 2076.063726][T26732] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2076.083166][T26732] RSP: 002b:00007fe2b7368038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2076.091411][T26732] RAX: ffffffffffffffda RBX: 00007fe2b8736050 RCX: 00007fe2b86160c9 07:18:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) [ 2076.099308][T26732] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007fe2b7368050 [ 2076.107120][T26732] RBP: 00007fe2b73681d0 R08: 0000000000000000 R09: 0000000000000058 [ 2076.114934][T26732] R10: 00007fe2b7368050 R11: 0000000000000246 R12: 0000000000000058 [ 2076.122746][T26732] R13: 00007fffbe52144f R14: 00007fe2b7368300 R15: 0000000000022000 [ 2076.130560][T26732] 07:18:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x5) [ 2076.218319][T26737] FAULT_INJECTION: forcing a failure. [ 2076.218319][T26737] name failslab, interval 1, probability 0, space 0, times 0 [ 2076.246651][T26737] CPU: 0 PID: 26737 Comm: syz-executor.2 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2076.256719][T26737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 07:18:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) [ 2076.266875][T26737] Call Trace: [ 2076.269998][T26737] [ 2076.272775][T26737] dump_stack_lvl+0x151/0x1b7 [ 2076.277292][T26737] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2076.282760][T26737] ? handle_pte_fault+0x517/0x11d0 [ 2076.287710][T26737] dump_stack+0x15/0x17 [ 2076.291699][T26737] should_fail+0x3c0/0x510 [ 2076.295951][T26737] __should_failslab+0x9f/0xe0 [ 2076.300551][T26737] should_failslab+0x9/0x20 [ 2076.304893][T26737] kmem_cache_alloc+0x4f/0x2f0 [ 2076.309496][T26737] ? dup_task_struct+0x53/0xa60 [ 2076.314178][T26737] ? __kasan_check_write+0x14/0x20 [ 2076.319134][T26737] dup_task_struct+0x53/0xa60 [ 2076.323765][T26737] ? __kasan_check_write+0x14/0x20 [ 2076.328710][T26737] copy_process+0x579/0x3250 [ 2076.333145][T26737] ? check_stack_object+0xf7/0x130 [ 2076.338097][T26737] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2076.343039][T26737] ? copy_clone_args_from_user+0x6cf/0x790 [ 2076.348677][T26737] kernel_clone+0x22d/0x990 [ 2076.353013][T26737] ? dup_mmap+0xea0/0xea0 [ 2076.357185][T26737] ? create_io_thread+0x1e0/0x1e0 [ 2076.362045][T26737] ? file_end_write+0x1b0/0x1b0 [ 2076.366731][T26737] __x64_sys_clone3+0x375/0x3a0 [ 2076.371418][T26737] ? __ia32_sys_clone+0x300/0x300 [ 2076.376276][T26737] ? ksys_write+0x25f/0x2c0 [ 2076.380613][T26737] ? debug_smp_processor_id+0x17/0x20 [ 2076.385824][T26737] do_syscall_64+0x44/0xd0 [ 2076.390078][T26737] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2076.395804][T26737] RIP: 0033:0x7fe2b86160c9 [ 2076.400062][T26737] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2076.419590][T26737] RSP: 002b:00007fe2b7368038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2076.427830][T26737] RAX: ffffffffffffffda RBX: 00007fe2b8736050 RCX: 00007fe2b86160c9 [ 2076.435642][T26737] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007fe2b7368050 [ 2076.443454][T26737] RBP: 00007fe2b73681d0 R08: 0000000000000000 R09: 0000000000000058 [ 2076.451261][T26737] R10: 00007fe2b7368050 R11: 0000000000000246 R12: 0000000000000058 [ 2076.459079][T26737] R13: 00007fffbe52144f R14: 00007fe2b7368300 R15: 0000000000022000 07:18:52 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r2 = socket(0x840000000002, 0x3, 0xff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r2, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r1, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) [ 2076.466895][T26737] 07:18:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 1) [ 2076.552395][T26747] FAULT_INJECTION: forcing a failure. [ 2076.552395][T26747] name failslab, interval 1, probability 0, space 0, times 0 [ 2076.565201][T26747] CPU: 1 PID: 26747 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2076.575245][T26747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2076.585145][T26747] Call Trace: [ 2076.588264][T26747] [ 2076.591042][T26747] dump_stack_lvl+0x151/0x1b7 [ 2076.595559][T26747] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2076.600855][T26747] ? cgroup_rstat_updated+0xe5/0x380 [ 2076.605706][T26748] FAULT_INJECTION: forcing a failure. [ 2076.605706][T26748] name failslab, interval 1, probability 0, space 0, times 0 [ 2076.606056][T26747] ? fault_around_bytes_set+0xc0/0xc0 [ 2076.623683][T26747] dump_stack+0x15/0x17 [ 2076.627678][T26747] should_fail+0x3c0/0x510 [ 2076.631923][T26747] ? alloc_pipe_info+0xe8/0x4b0 [ 2076.636610][T26747] __should_failslab+0x9f/0xe0 [ 2076.641208][T26747] should_failslab+0x9/0x20 [ 2076.645550][T26747] kmem_cache_alloc_trace+0x4a/0x310 [ 2076.650670][T26747] ? _kstrtoull+0x3a8/0x4b0 [ 2076.655009][T26747] alloc_pipe_info+0xe8/0x4b0 [ 2076.659535][T26747] splice_direct_to_actor+0xa3f/0xc10 [ 2076.664730][T26747] ? avc_policy_seqno+0x1b/0x70 [ 2076.669444][T26747] ? do_splice_direct+0x3f0/0x3f0 [ 2076.674277][T26747] ? pipe_to_sendpage+0x340/0x340 [ 2076.679141][T26747] ? rw_verify_area+0xa7/0x1c0 [ 2076.683742][T26747] do_splice_direct+0x2a0/0x3f0 [ 2076.688427][T26747] ? splice_direct_to_actor+0xc10/0xc10 [ 2076.693811][T26747] do_sendfile+0x63b/0xfd0 [ 2076.698059][T26747] ? __mutex_lock_slowpath+0x10/0x10 [ 2076.703179][T26747] ? do_pwritev+0x6a0/0x6a0 [ 2076.707521][T26747] ? ksys_write+0x25f/0x2c0 [ 2076.711858][T26747] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 2076.717762][T26747] __x64_sys_sendfile64+0x1ce/0x230 [ 2076.722797][T26747] ? __ia32_sys_sendfile+0x250/0x250 [ 2076.727918][T26747] ? debug_smp_processor_id+0x17/0x20 [ 2076.733127][T26747] do_syscall_64+0x44/0xd0 [ 2076.737378][T26747] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2076.743106][T26747] RIP: 0033:0x7f3e180a30c9 07:18:52 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x6}, 0x0) [ 2076.747357][T26747] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2076.766801][T26747] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2076.775047][T26747] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 [ 2076.782857][T26747] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 2076.790669][T26747] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2076.798534][T26747] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2076.806313][T26747] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2076.814106][T26747] [ 2076.816969][T26748] CPU: 0 PID: 26748 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2076.827143][T26748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2076.837015][T26748] Call Trace: [ 2076.840143][T26748] [ 2076.842925][T26748] dump_stack_lvl+0x151/0x1b7 [ 2076.847469][T26748] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2076.852727][T26748] ? handle_pte_fault+0x517/0x11d0 [ 2076.857676][T26748] dump_stack+0x15/0x17 [ 2076.861669][T26748] should_fail+0x3c0/0x510 [ 2076.865920][T26748] __should_failslab+0x9f/0xe0 [ 2076.870521][T26748] should_failslab+0x9/0x20 [ 2076.874865][T26748] kmem_cache_alloc+0x4f/0x2f0 [ 2076.879460][T26748] ? dup_task_struct+0x53/0xa60 [ 2076.884144][T26748] ? __kasan_check_write+0x14/0x20 [ 2076.889094][T26748] dup_task_struct+0x53/0xa60 [ 2076.893604][T26748] ? __kasan_check_write+0x14/0x20 [ 2076.898552][T26748] copy_process+0x579/0x3250 [ 2076.902981][T26748] ? check_stack_object+0xf7/0x130 [ 2076.907927][T26748] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2076.912876][T26748] ? copy_clone_args_from_user+0x6cf/0x790 [ 2076.918519][T26748] kernel_clone+0x22d/0x990 [ 2076.922856][T26748] ? dup_mmap+0xea0/0xea0 [ 2076.927021][T26748] ? create_io_thread+0x1e0/0x1e0 [ 2076.931881][T26748] ? file_end_write+0x1b0/0x1b0 [ 2076.936571][T26748] __x64_sys_clone3+0x375/0x3a0 [ 2076.941255][T26748] ? __ia32_sys_clone+0x300/0x300 [ 2076.946124][T26748] ? ksys_write+0x25f/0x2c0 [ 2076.950458][T26748] ? debug_smp_processor_id+0x17/0x20 [ 2076.955664][T26748] do_syscall_64+0x44/0xd0 [ 2076.959916][T26748] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2076.965736][T26748] RIP: 0033:0x7f8f8bc980c9 [ 2076.969985][T26748] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2076.989427][T26748] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:18:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 2) 07:18:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) [ 2076.997935][T26748] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2077.005742][T26748] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2077.013730][T26748] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2077.021540][T26748] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2077.029357][T26748] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2077.037166][T26748] [ 2077.065973][T26759] FAULT_INJECTION: forcing a failure. [ 2077.065973][T26759] name failslab, interval 1, probability 0, space 0, times 0 [ 2077.078643][T26759] CPU: 0 PID: 26759 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2077.088705][T26759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2077.098597][T26759] Call Trace: [ 2077.101719][T26759] [ 2077.104503][T26759] dump_stack_lvl+0x151/0x1b7 [ 2077.109015][T26759] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2077.114392][T26759] dump_stack+0x15/0x17 [ 2077.118384][T26759] should_fail+0x3c0/0x510 [ 2077.122640][T26759] ? alloc_pipe_info+0x205/0x4b0 [ 2077.127409][T26759] __should_failslab+0x9f/0xe0 [ 2077.132010][T26759] should_failslab+0x9/0x20 [ 2077.136349][T26759] __kmalloc+0x6d/0x350 [ 2077.140342][T26759] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2077.145725][T26759] ? alloc_pipe_info+0xe8/0x4b0 [ 2077.150428][T26759] alloc_pipe_info+0x205/0x4b0 [ 2077.155015][T26759] splice_direct_to_actor+0xa3f/0xc10 [ 2077.160217][T26759] ? avc_policy_seqno+0x1b/0x70 [ 2077.164905][T26759] ? do_splice_direct+0x3f0/0x3f0 [ 2077.169767][T26759] ? pipe_to_sendpage+0x340/0x340 [ 2077.174646][T26759] ? rw_verify_area+0xa7/0x1c0 [ 2077.179230][T26759] do_splice_direct+0x2a0/0x3f0 [ 2077.183914][T26759] ? splice_direct_to_actor+0xc10/0xc10 [ 2077.189383][T26759] do_sendfile+0x63b/0xfd0 [ 2077.193640][T26759] ? __mutex_lock_slowpath+0x10/0x10 [ 2077.198789][T26759] ? do_pwritev+0x6a0/0x6a0 [ 2077.203095][T26759] ? ksys_write+0x25f/0x2c0 [ 2077.207435][T26759] __x64_sys_sendfile64+0x1ce/0x230 [ 2077.212477][T26759] ? __ia32_sys_sendfile+0x250/0x250 [ 2077.217592][T26759] ? debug_smp_processor_id+0x17/0x20 [ 2077.222845][T26759] do_syscall_64+0x44/0xd0 [ 2077.227052][T26759] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2077.232806][T26759] RIP: 0033:0x7f3e180a30c9 [ 2077.237036][T26759] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2077.252592][T26761] FAULT_INJECTION: forcing a failure. [ 2077.252592][T26761] name failslab, interval 1, probability 0, space 0, times 0 [ 2077.256473][T26759] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2077.256502][T26759] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 [ 2077.256516][T26759] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 2077.292870][T26759] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2077.300676][T26759] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2077.308573][T26759] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2077.316390][T26759] [ 2077.319250][T26761] CPU: 1 PID: 26761 Comm: syz-executor.2 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2077.329335][T26761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2077.339217][T26761] Call Trace: [ 2077.342339][T26761] [ 2077.345143][T26761] dump_stack_lvl+0x151/0x1b7 [ 2077.349631][T26761] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2077.354931][T26761] ? __kasan_slab_alloc+0xc4/0xe0 [ 2077.359793][T26761] ? kmem_cache_alloc+0x189/0x2f0 [ 2077.364735][T26761] dump_stack+0x15/0x17 [ 2077.368725][T26761] should_fail+0x3c0/0x510 [ 2077.372982][T26761] ? __get_vm_area_node+0x13a/0x380 [ 2077.378013][T26761] __should_failslab+0x9f/0xe0 [ 2077.382610][T26761] should_failslab+0x9/0x20 [ 2077.386951][T26761] kmem_cache_alloc_trace+0x4a/0x310 [ 2077.392072][T26761] __get_vm_area_node+0x13a/0x380 [ 2077.396930][T26761] __vmalloc_node_range+0xda/0x800 [ 2077.401880][T26761] ? copy_process+0x579/0x3250 [ 2077.406481][T26761] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2077.411338][T26761] ? dup_task_struct+0x53/0xa60 [ 2077.416025][T26761] dup_task_struct+0x61f/0xa60 [ 2077.420630][T26761] ? copy_process+0x579/0x3250 [ 2077.425234][T26761] ? __kasan_check_write+0x14/0x20 [ 2077.430174][T26761] copy_process+0x579/0x3250 [ 2077.434607][T26761] ? check_stack_object+0xf7/0x130 [ 2077.439549][T26761] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2077.444496][T26761] ? copy_clone_args_from_user+0x6cf/0x790 [ 2077.450660][T26761] kernel_clone+0x22d/0x990 [ 2077.454996][T26761] ? dup_mmap+0xea0/0xea0 [ 2077.459168][T26761] ? create_io_thread+0x1e0/0x1e0 [ 2077.464027][T26761] ? file_end_write+0x1b0/0x1b0 [ 2077.468709][T26761] __x64_sys_clone3+0x375/0x3a0 [ 2077.473397][T26761] ? __ia32_sys_clone+0x300/0x300 [ 2077.478268][T26761] ? ksys_write+0x25f/0x2c0 [ 2077.482600][T26761] ? debug_smp_processor_id+0x17/0x20 [ 2077.487900][T26761] do_syscall_64+0x44/0xd0 [ 2077.492149][T26761] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2077.497874][T26761] RIP: 0033:0x7fe2b86160c9 [ 2077.502154][T26761] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2077.521567][T26761] RSP: 002b:00007fe2b7368038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2077.529813][T26761] RAX: ffffffffffffffda RBX: 00007fe2b8736050 RCX: 00007fe2b86160c9 [ 2077.537622][T26761] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007fe2b7368050 [ 2077.545532][T26761] RBP: 00007fe2b73681d0 R08: 0000000000000000 R09: 0000000000000058 [ 2077.553341][T26761] R10: 00007fe2b7368050 R11: 0000000000000246 R12: 0000000000000058 07:18:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x6) 07:18:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 07:18:53 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r2 = socket(0x840000000002, 0x3, 0xff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r2, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r1, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 3) [ 2077.561151][T26761] R13: 00007fffbe52144f R14: 00007fe2b7368300 R15: 0000000000022000 [ 2077.568968][T26761] [ 2077.576003][T26761] syz-executor.2: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 2077.639347][T26761] CPU: 1 PID: 26761 Comm: syz-executor.2 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2077.649425][T26761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2077.659402][T26761] Call Trace: [ 2077.662624][T26761] [ 2077.665407][T26761] dump_stack_lvl+0x151/0x1b7 [ 2077.669915][T26761] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2077.675209][T26761] ? __rcu_read_unlock+0x7c/0xd0 [ 2077.679984][T26761] dump_stack+0x15/0x17 [ 2077.683976][T26761] warn_alloc+0x242/0x3d0 [ 2077.688143][T26761] ? zone_watermark_ok_safe+0x280/0x280 [ 2077.693524][T26761] ? __get_vm_area_node+0x36a/0x380 [ 2077.698556][T26761] __vmalloc_node_range+0x2be/0x800 [ 2077.703591][T26761] ? dup_task_struct+0x53/0xa60 [ 2077.708279][T26761] dup_task_struct+0x61f/0xa60 [ 2077.712880][T26761] ? copy_process+0x579/0x3250 [ 2077.717486][T26761] ? __kasan_check_write+0x14/0x20 [ 2077.722429][T26761] copy_process+0x579/0x3250 [ 2077.726856][T26761] ? check_stack_object+0xf7/0x130 [ 2077.731796][T26761] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2077.736746][T26761] ? copy_clone_args_from_user+0x6cf/0x790 [ 2077.742387][T26761] kernel_clone+0x22d/0x990 [ 2077.746727][T26761] ? dup_mmap+0xea0/0xea0 [ 2077.750891][T26761] ? create_io_thread+0x1e0/0x1e0 [ 2077.755754][T26761] ? file_end_write+0x1b0/0x1b0 [ 2077.760442][T26761] __x64_sys_clone3+0x375/0x3a0 [ 2077.765127][T26761] ? __ia32_sys_clone+0x300/0x300 [ 2077.769989][T26761] ? ksys_write+0x25f/0x2c0 [ 2077.774329][T26761] ? debug_smp_processor_id+0x17/0x20 [ 2077.779539][T26761] do_syscall_64+0x44/0xd0 [ 2077.783795][T26761] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2077.789517][T26761] RIP: 0033:0x7fe2b86160c9 [ 2077.793769][T26761] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2077.813314][T26761] RSP: 002b:00007fe2b7368038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2077.821541][T26761] RAX: ffffffffffffffda RBX: 00007fe2b8736050 RCX: 00007fe2b86160c9 [ 2077.829352][T26761] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007fe2b7368050 07:18:53 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x7}, 0x0) [ 2077.837251][T26761] RBP: 00007fe2b73681d0 R08: 0000000000000000 R09: 0000000000000058 [ 2077.845059][T26761] R10: 00007fe2b7368050 R11: 0000000000000246 R12: 0000000000000058 [ 2077.852870][T26761] R13: 00007fffbe52144f R14: 00007fe2b7368300 R15: 0000000000022000 [ 2077.860691][T26761] [ 2077.868327][T26775] FAULT_INJECTION: forcing a failure. [ 2077.868327][T26775] name failslab, interval 1, probability 0, space 0, times 0 [ 2077.875429][T26761] Mem-Info: [ 2077.883304][T26775] CPU: 0 PID: 26775 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2077.884929][T26761] active_anon:13934 inactive_anon:258925 isolated_anon:0 [ 2077.884929][T26761] active_file:4870 inactive_file:8781 isolated_file:0 [ 2077.884929][T26761] unevictable:0 dirty:15 writeback:0 [ 2077.884929][T26761] slab_reclaimable:11647 slab_unreclaimable:77348 [ 2077.884929][T26761] mapped:32999 shmem:15524 pagetables:1299 bounce:0 [ 2077.884929][T26761] kernel_misc_reclaimable:0 [ 2077.884929][T26761] free:1286190 free_pcp:21171 free_cma:0 [ 2077.893754][T26775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2077.893769][T26775] Call Trace: [ 2077.893776][T26775] [ 2077.893784][T26775] dump_stack_lvl+0x151/0x1b7 [ 2077.893809][T26775] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2077.893827][T26775] ? __this_cpu_preempt_check+0x13/0x20 [ 2077.893843][T26775] dump_stack+0x15/0x17 [ 2077.893859][T26775] should_fail+0x3c0/0x510 [ 2077.893878][T26775] __should_failslab+0x9f/0xe0 [ 2077.893896][T26775] should_failslab+0x9/0x20 [ 2077.893912][T26775] kmem_cache_alloc+0x4f/0x2f0 [ 2077.893930][T26775] ? __kasan_check_write+0x14/0x20 [ 2077.936203][T26761] Node 0 active_anon:55736kB inactive_anon:1035700kB active_file:19480kB inactive_file:35124kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:131996kB dirty:60kB writeback:0kB shmem:62096kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 24576kB writeback_tmp:0kB kernel_stack:5548kB pagetables:5196kB all_unreclaimable? no [ 2077.945449][T26775] ? prepare_creds+0x30/0x690 [ 2077.945478][T26775] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 2077.945498][T26775] prepare_creds+0x30/0x690 [ 2077.945516][T26775] copy_creds+0xde/0x640 [ 2077.945530][T26775] copy_process+0x775/0x3250 [ 2077.945549][T26775] ? check_stack_object+0xf7/0x130 [ 2077.948738][T26761] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982424kB mlocked:0kB bounce:0kB free_pcp:5700kB local_pcp:5644kB free_cma:0kB [ 2077.951353][T26775] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2077.951376][T26775] ? copy_clone_args_from_user+0x6cf/0x790 [ 2077.955969][T26761] lowmem_reserve[]: [ 2077.961159][T26775] kernel_clone+0x22d/0x990 [ 2077.961178][T26775] ? dup_mmap+0xea0/0xea0 [ 2077.961196][T26775] ? create_io_thread+0x1e0/0x1e0 [ 2077.966637][T26761] 0 [ 2077.970530][T26775] ? file_end_write+0x1b0/0x1b0 [ 2077.970555][T26775] __x64_sys_clone3+0x375/0x3a0 [ 2077.970571][T26775] ? __ia32_sys_clone+0x300/0x300 [ 2077.974863][T26761] 3941 [ 2077.979405][T26775] ? ksys_write+0x25f/0x2c0 [ 2077.979425][T26775] ? debug_smp_processor_id+0x17/0x20 [ 2077.979443][T26775] do_syscall_64+0x44/0xd0 [ 2077.983804][T26761] 3941 [ 2077.988326][T26775] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2077.988348][T26775] RIP: 0033:0x7f8f8bc980c9 [ 2077.988363][T26775] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2077.993348][T26761] [ 2078.024427][T26775] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2078.024449][T26775] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2078.024462][T26775] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2078.024472][T26775] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2078.024483][T26775] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2078.029054][T26761] Normal free:2168036kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:55736kB inactive_anon:1035700kB active_file:19480kB inactive_file:35124kB unevictable:0kB writepending:56kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:78980kB local_pcp:26264kB free_cma:0kB [ 2078.034232][T26775] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2078.034251][T26775] [ 2078.259500][T26771] FAULT_INJECTION: forcing a failure. [ 2078.259500][T26771] name failslab, interval 1, probability 0, space 0, times 0 [ 2078.272621][T26771] CPU: 1 PID: 26771 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2078.282906][T26771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2078.292896][T26771] Call Trace: [ 2078.296015][T26771] [ 2078.298791][T26771] dump_stack_lvl+0x151/0x1b7 [ 2078.303314][T26771] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2078.308779][T26771] ? save_stack+0x119/0x1e0 [ 2078.313113][T26771] dump_stack+0x15/0x17 [ 2078.317103][T26771] should_fail+0x3c0/0x510 [ 2078.321356][T26771] ? __iomap_dio_rw+0x2ed/0x2190 [ 2078.326139][T26771] __should_failslab+0x9f/0xe0 [ 2078.330734][T26771] should_failslab+0x9/0x20 [ 2078.335075][T26771] kmem_cache_alloc_trace+0x4a/0x310 [ 2078.340192][T26771] __iomap_dio_rw+0x2ed/0x2190 [ 2078.344793][T26771] ? __kernel_text_address+0x9a/0x110 [ 2078.349998][T26771] ? unwind_get_return_address+0x4c/0x90 [ 2078.355466][T26771] ? arch_stack_walk+0xf8/0x140 [ 2078.360169][T26771] ? iomap_dio_complete+0x730/0x730 [ 2078.365190][T26771] ? ____kasan_kmalloc+0xee/0x110 [ 2078.370048][T26771] ? ____kasan_kmalloc+0xdc/0x110 [ 2078.374910][T26771] ? __kasan_kmalloc+0x9/0x10 [ 2078.379422][T26771] ? __kmalloc+0x203/0x350 [ 2078.383673][T26771] ? alloc_pipe_info+0x205/0x4b0 [ 2078.388448][T26771] ? splice_direct_to_actor+0xa3f/0xc10 [ 2078.393837][T26771] ? do_splice_direct+0x2a0/0x3f0 [ 2078.398693][T26771] ? down_read+0xf9/0x230 [ 2078.402859][T26771] iomap_dio_rw+0x3e/0x90 [ 2078.407022][T26771] ext4_file_read_iter+0x3ab/0x4b0 [ 2078.411970][T26771] generic_file_splice_read+0x479/0x760 [ 2078.417350][T26771] ? splice_shrink_spd+0xb0/0xb0 [ 2078.422125][T26771] ? selinux_file_permission+0x2ae/0x520 [ 2078.427680][T26771] ? rw_verify_area+0xa7/0x1c0 [ 2078.432280][T26771] splice_direct_to_actor+0x450/0xc10 [ 2078.437491][T26771] ? do_splice_direct+0x3f0/0x3f0 [ 2078.442349][T26771] ? pipe_to_sendpage+0x340/0x340 [ 2078.447217][T26771] ? rw_verify_area+0xa7/0x1c0 [ 2078.451812][T26771] do_splice_direct+0x2a0/0x3f0 [ 2078.456590][T26771] ? splice_direct_to_actor+0xc10/0xc10 [ 2078.461968][T26771] do_sendfile+0x63b/0xfd0 [ 2078.466231][T26771] ? __mutex_lock_slowpath+0x10/0x10 [ 2078.471443][T26771] ? do_pwritev+0x6a0/0x6a0 [ 2078.475780][T26771] ? ksys_write+0x25f/0x2c0 [ 2078.480120][T26771] __x64_sys_sendfile64+0x1ce/0x230 [ 2078.485154][T26771] ? __ia32_sys_sendfile+0x250/0x250 [ 2078.490297][T26771] ? debug_smp_processor_id+0x17/0x20 [ 2078.495598][T26771] do_syscall_64+0x44/0xd0 [ 2078.499823][T26771] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2078.505550][T26771] RIP: 0033:0x7f3e180a30c9 [ 2078.509805][T26771] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2078.529244][T26771] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2078.537575][T26771] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 [ 2078.545387][T26771] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 2078.553200][T26771] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2078.561098][T26771] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2078.568911][T26771] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2078.576810][T26771] [ 2078.580258][T26761] lowmem_reserve[]: 0 0 0 07:18:54 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r2 = socket(0x840000000002, 0x3, 0xff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r2, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r1, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x7) [ 2078.588869][T26761] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 2078.604944][T26761] Normal: 708*4kB (UME) 593*8kB (UE) 1135*16kB (UME) 1357*32kB (UME) 538*64kB (UME) 129*128kB (UME) 27*256kB (UME) 15*512kB (UME) 8*1024kB (M) 3*2048kB (M) 493*4096kB (UM) = 2168360kB 07:18:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 4) [ 2078.677802][T26761] 29157 total pagecache pages [ 2078.690578][T26761] 0 pages in swap cache [ 2078.695201][T26761] Swap cache stats: add 0, delete 0, find 0/0 [ 2078.704674][T26761] Free swap = 0kB [ 2078.708923][T26761] Total swap = 0kB 07:18:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) [ 2078.728849][T26761] 2097051 pages RAM [ 2078.738197][T26761] 0 pages HighMem/MovableOnly [ 2078.749215][T26761] 342483 pages reserved [ 2078.759996][T26792] FAULT_INJECTION: forcing a failure. [ 2078.759996][T26792] name failslab, interval 1, probability 0, space 0, times 0 [ 2078.760398][T26761] 0 pages cma reserved 07:18:54 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x9}, 0x0) [ 2078.787340][T26792] CPU: 1 PID: 26792 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2078.797579][T26792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2078.807562][T26792] Call Trace: [ 2078.810788][T26792] [ 2078.813555][T26792] dump_stack_lvl+0x151/0x1b7 [ 2078.818072][T26792] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2078.823368][T26792] dump_stack+0x15/0x17 [ 2078.827359][T26792] should_fail+0x3c0/0x510 [ 2078.831613][T26792] ? ext4_find_extent+0x249/0xd80 [ 2078.836471][T26792] __should_failslab+0x9f/0xe0 [ 2078.841074][T26792] should_failslab+0x9/0x20 [ 2078.845438][T26792] __kmalloc+0x6d/0x350 [ 2078.849487][T26792] ext4_find_extent+0x249/0xd80 [ 2078.854173][T26792] ext4_ext_map_blocks+0x22d/0x3cb0 [ 2078.859208][T26792] ? ext4_ext_release+0x10/0x10 [ 2078.863895][T26792] ? is_bpf_text_address+0x1a2/0x1c0 [ 2078.869014][T26792] ? stack_trace_save+0x1f0/0x1f0 [ 2078.873969][T26792] ? __kasan_check_write+0x14/0x20 [ 2078.878911][T26792] ? down_read+0xf9/0x230 [ 2078.883075][T26792] ? ext4_es_lookup_extent+0x3c5/0x9d0 [ 2078.888369][T26792] ext4_map_blocks+0x42c/0x1e20 [ 2078.893061][T26792] ? ext4_issue_zeroout+0x260/0x260 [ 2078.898098][T26792] ? ____kasan_kmalloc+0xee/0x110 [ 2078.902958][T26792] ? ____kasan_kmalloc+0xdc/0x110 [ 2078.907818][T26792] ? __kasan_kmalloc+0x9/0x10 [ 2078.912332][T26792] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2078.917710][T26792] ? __iomap_dio_rw+0x2ed/0x2190 [ 2078.922486][T26792] ? iomap_dio_rw+0x3e/0x90 [ 2078.926829][T26792] ? ext4_file_read_iter+0x3ab/0x4b0 [ 2078.931951][T26792] ext4_iomap_begin+0x2ef/0xd90 [ 2078.936637][T26792] ? __kasan_check_read+0x11/0x20 [ 2078.941493][T26792] ? ext4_alloc_da_blocks+0x180/0x180 [ 2078.946698][T26792] ? filemap_range_needs_writeback+0x870/0x870 [ 2078.952718][T26792] ? ext4_alloc_da_blocks+0x180/0x180 [ 2078.957989][T26792] iomap_iter+0x660/0x830 [ 2078.962153][T26792] ? __kasan_kmalloc+0x9/0x10 [ 2078.966662][T26792] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2078.972046][T26792] ? __iomap_dio_rw+0x2ed/0x2190 [ 2078.976816][T26792] __iomap_dio_rw+0xc23/0x2190 [ 2078.981426][T26792] ? iomap_dio_complete+0x730/0x730 [ 2078.986454][T26792] ? ____kasan_kmalloc+0xee/0x110 [ 2078.991320][T26792] ? ____kasan_kmalloc+0xdc/0x110 [ 2078.996170][T26792] ? __kasan_kmalloc+0x9/0x10 [ 2079.000687][T26792] ? __kmalloc+0x203/0x350 [ 2079.004976][T26792] ? alloc_pipe_info+0x205/0x4b0 [ 2079.009710][T26792] ? splice_direct_to_actor+0xa3f/0xc10 [ 2079.015092][T26792] ? do_splice_direct+0x2a0/0x3f0 [ 2079.019954][T26792] ? down_read+0xf9/0x230 [ 2079.024120][T26792] iomap_dio_rw+0x3e/0x90 [ 2079.028511][T26792] ext4_file_read_iter+0x3ab/0x4b0 [ 2079.033442][T26792] generic_file_splice_read+0x479/0x760 [ 2079.038823][T26792] ? splice_shrink_spd+0xb0/0xb0 [ 2079.043593][T26792] ? selinux_file_permission+0x2ae/0x520 [ 2079.049068][T26792] ? rw_verify_area+0xa7/0x1c0 [ 2079.053665][T26792] splice_direct_to_actor+0x450/0xc10 [ 2079.059135][T26792] ? do_splice_direct+0x3f0/0x3f0 [ 2079.063995][T26792] ? pipe_to_sendpage+0x340/0x340 [ 2079.068849][T26792] ? rw_verify_area+0xa7/0x1c0 [ 2079.073460][T26792] do_splice_direct+0x2a0/0x3f0 [ 2079.078139][T26792] ? splice_direct_to_actor+0xc10/0xc10 [ 2079.083523][T26792] do_sendfile+0x63b/0xfd0 [ 2079.087774][T26792] ? __mutex_lock_slowpath+0x10/0x10 [ 2079.092895][T26792] ? do_pwritev+0x6a0/0x6a0 [ 2079.097233][T26792] ? ksys_write+0x25f/0x2c0 [ 2079.101571][T26792] __x64_sys_sendfile64+0x1ce/0x230 [ 2079.106609][T26792] ? __ia32_sys_sendfile+0x250/0x250 [ 2079.111728][T26792] ? debug_smp_processor_id+0x17/0x20 [ 2079.116935][T26792] do_syscall_64+0x44/0xd0 [ 2079.121197][T26792] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2079.126915][T26792] RIP: 0033:0x7f3e180a30c9 [ 2079.131168][T26792] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2079.150696][T26792] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2079.158942][T26792] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 [ 2079.166763][T26792] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 2079.174564][T26792] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 07:18:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2079.182375][T26792] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2079.190185][T26792] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2079.198004][T26792] [ 2079.205270][T26802] FAULT_INJECTION: forcing a failure. [ 2079.205270][T26802] name failslab, interval 1, probability 0, space 0, times 0 [ 2079.222210][T26802] CPU: 1 PID: 26802 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2079.232277][T26802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2079.242167][T26802] Call Trace: [ 2079.245288][T26802] [ 2079.248068][T26802] dump_stack_lvl+0x151/0x1b7 [ 2079.252583][T26802] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2079.257875][T26802] dump_stack+0x15/0x17 [ 2079.261867][T26802] should_fail+0x3c0/0x510 [ 2079.266122][T26802] ? security_prepare_creds+0x50/0x160 [ 2079.271416][T26802] __should_failslab+0x9f/0xe0 [ 2079.276014][T26802] should_failslab+0x9/0x20 [ 2079.280367][T26802] __kmalloc+0x6d/0x350 [ 2079.284355][T26802] security_prepare_creds+0x50/0x160 [ 2079.289468][T26802] prepare_creds+0x471/0x690 [ 2079.293895][T26802] copy_creds+0xde/0x640 [ 2079.297978][T26802] copy_process+0x775/0x3250 [ 2079.302404][T26802] ? check_stack_object+0xf7/0x130 [ 2079.307386][T26802] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2079.312297][T26802] ? copy_clone_args_from_user+0x6cf/0x790 [ 2079.317940][T26802] kernel_clone+0x22d/0x990 [ 2079.322275][T26802] ? dup_mmap+0xea0/0xea0 [ 2079.326445][T26802] ? create_io_thread+0x1e0/0x1e0 [ 2079.331305][T26802] ? file_end_write+0x1b0/0x1b0 [ 2079.335992][T26802] __x64_sys_clone3+0x375/0x3a0 [ 2079.340681][T26802] ? __ia32_sys_clone+0x300/0x300 [ 2079.345541][T26802] ? ksys_write+0x25f/0x2c0 [ 2079.349884][T26802] ? debug_smp_processor_id+0x17/0x20 [ 2079.355106][T26802] do_syscall_64+0x44/0xd0 [ 2079.359342][T26802] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2079.365066][T26802] RIP: 0033:0x7f8f8bc980c9 [ 2079.369344][T26802] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:18:55 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 5) [ 2079.389021][T26802] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2079.397272][T26802] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2079.405080][T26802] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2079.412891][T26802] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2079.420736][T26802] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2079.428695][T26802] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2079.436593][T26802] 07:18:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) [ 2079.478861][T26808] FAULT_INJECTION: forcing a failure. [ 2079.478861][T26808] name failslab, interval 1, probability 0, space 0, times 0 [ 2079.491604][T26808] CPU: 0 PID: 26808 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2079.501663][T26808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2079.511564][T26808] Call Trace: [ 2079.514685][T26808] [ 2079.517460][T26808] dump_stack_lvl+0x151/0x1b7 [ 2079.521975][T26808] ? bfq_pos_tree_add_move+0x43e/0x43e 07:18:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x9) [ 2079.527272][T26808] dump_stack+0x15/0x17 [ 2079.531261][T26808] should_fail+0x3c0/0x510 [ 2079.535515][T26808] __should_failslab+0x9f/0xe0 [ 2079.540121][T26808] should_failslab+0x9/0x20 [ 2079.544452][T26808] kmem_cache_alloc+0x4f/0x2f0 [ 2079.549054][T26808] ? __es_insert_extent+0x800/0x1810 [ 2079.554172][T26808] __es_insert_extent+0x800/0x1810 [ 2079.559121][T26808] ? __kasan_check_write+0x14/0x20 [ 2079.564074][T26808] ? _raw_write_trylock+0x1e0/0x1e0 [ 2079.569109][T26808] ext4_es_insert_extent+0x320/0x2e40 [ 2079.574318][T26808] ? memset+0x35/0x40 [ 2079.578132][T26808] ? ext4_es_scan_clu+0x340/0x340 [ 2079.582999][T26808] ? _raw_read_unlock+0x25/0x40 [ 2079.587673][T26808] ? ext4_es_find_extent_range+0xd2/0x2d0 [ 2079.593231][T26808] ? trace_ext4_ext_convert_to_initialized_fastpath+0x130/0x130 [ 2079.600834][T26808] ext4_ext_map_blocks+0x1f32/0x3cb0 [ 2079.605945][T26808] ? ext4_ext_release+0x10/0x10 [ 2079.610634][T26808] ? is_bpf_text_address+0x1a2/0x1c0 [ 2079.615748][T26808] ? stack_trace_save+0x1f0/0x1f0 [ 2079.620612][T26808] ? __kasan_check_write+0x14/0x20 [ 2079.625558][T26808] ? down_read+0xf9/0x230 [ 2079.629743][T26808] ? ext4_es_lookup_extent+0x3c5/0x9d0 [ 2079.635036][T26808] ext4_map_blocks+0x42c/0x1e20 [ 2079.639712][T26808] ? ext4_issue_zeroout+0x260/0x260 [ 2079.644738][T26808] ? ____kasan_kmalloc+0xee/0x110 [ 2079.649600][T26808] ? ____kasan_kmalloc+0xdc/0x110 [ 2079.654457][T26808] ? __kasan_kmalloc+0x9/0x10 [ 2079.658974][T26808] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2079.664353][T26808] ? __iomap_dio_rw+0x2ed/0x2190 [ 2079.669125][T26808] ? iomap_dio_rw+0x3e/0x90 [ 2079.673493][T26808] ? ext4_file_read_iter+0x3ab/0x4b0 [ 2079.678588][T26808] ext4_iomap_begin+0x2ef/0xd90 [ 2079.683273][T26808] ? __kasan_check_read+0x11/0x20 [ 2079.688138][T26808] ? ext4_alloc_da_blocks+0x180/0x180 [ 2079.693340][T26808] ? filemap_range_needs_writeback+0x870/0x870 [ 2079.699328][T26808] ? ext4_alloc_da_blocks+0x180/0x180 [ 2079.704542][T26808] iomap_iter+0x660/0x830 [ 2079.708704][T26808] ? __kasan_kmalloc+0x9/0x10 [ 2079.713221][T26808] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2079.718596][T26808] ? __iomap_dio_rw+0x2ed/0x2190 [ 2079.723372][T26808] __iomap_dio_rw+0xc23/0x2190 [ 2079.727973][T26808] ? iomap_dio_complete+0x730/0x730 [ 2079.733012][T26808] ? ____kasan_kmalloc+0xee/0x110 [ 2079.737863][T26808] ? ____kasan_kmalloc+0xdc/0x110 [ 2079.742727][T26808] ? __kasan_kmalloc+0x9/0x10 [ 2079.747236][T26808] ? __kmalloc+0x203/0x350 [ 2079.751490][T26808] ? alloc_pipe_info+0x205/0x4b0 [ 2079.756271][T26808] ? splice_direct_to_actor+0xa3f/0xc10 [ 2079.761655][T26808] ? do_splice_direct+0x2a0/0x3f0 [ 2079.766599][T26808] ? down_read+0xf9/0x230 [ 2079.770676][T26808] iomap_dio_rw+0x3e/0x90 [ 2079.774842][T26808] ext4_file_read_iter+0x3ab/0x4b0 [ 2079.779789][T26808] generic_file_splice_read+0x479/0x760 [ 2079.785169][T26808] ? splice_shrink_spd+0xb0/0xb0 [ 2079.789940][T26808] ? selinux_file_permission+0x2ae/0x520 [ 2079.795413][T26808] ? rw_verify_area+0xa7/0x1c0 [ 2079.800010][T26808] splice_direct_to_actor+0x450/0xc10 [ 2079.805219][T26808] ? do_splice_direct+0x3f0/0x3f0 [ 2079.810087][T26808] ? pipe_to_sendpage+0x340/0x340 [ 2079.815058][T26808] ? rw_verify_area+0xa7/0x1c0 [ 2079.819632][T26808] do_splice_direct+0x2a0/0x3f0 [ 2079.824317][T26808] ? splice_direct_to_actor+0xc10/0xc10 [ 2079.829696][T26808] do_sendfile+0x63b/0xfd0 [ 2079.833947][T26808] ? __mutex_lock_slowpath+0x10/0x10 [ 2079.839073][T26808] ? do_pwritev+0x6a0/0x6a0 [ 2079.843415][T26808] ? ksys_write+0x25f/0x2c0 [ 2079.847759][T26808] __x64_sys_sendfile64+0x1ce/0x230 [ 2079.852782][T26808] ? __ia32_sys_sendfile+0x250/0x250 [ 2079.857902][T26808] ? debug_smp_processor_id+0x17/0x20 [ 2079.863115][T26808] do_syscall_64+0x44/0xd0 [ 2079.867363][T26808] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2079.873095][T26808] RIP: 0033:0x7f3e180a30c9 [ 2079.877344][T26808] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2079.896785][T26808] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2079.905030][T26808] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 [ 2079.912971][T26808] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 2079.920766][T26808] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 07:18:55 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xa}, 0x0) [ 2079.928576][T26808] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2079.936393][T26808] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2079.944202][T26808] [ 2079.947983][T26817] FAULT_INJECTION: forcing a failure. [ 2079.947983][T26817] name failslab, interval 1, probability 0, space 0, times 0 [ 2079.964700][T26817] CPU: 0 PID: 26817 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2079.974764][T26817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2079.984850][T26817] Call Trace: [ 2079.987971][T26817] [ 2079.990751][T26817] dump_stack_lvl+0x151/0x1b7 [ 2079.995904][T26817] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2080.001206][T26817] ? avc_has_perm_noaudit+0x358/0x450 [ 2080.006413][T26817] dump_stack+0x15/0x17 [ 2080.010400][T26817] should_fail+0x3c0/0x510 [ 2080.014653][T26817] __should_failslab+0x9f/0xe0 [ 2080.019251][T26817] should_failslab+0x9/0x20 [ 2080.023679][T26817] kmem_cache_alloc+0x4f/0x2f0 [ 2080.028369][T26817] ? dup_fd+0x71/0xa40 [ 2080.032275][T26817] dup_fd+0x71/0xa40 [ 2080.036088][T26817] ? avc_has_perm+0x16d/0x260 [ 2080.040602][T26817] ? avc_has_perm_noaudit+0x450/0x450 [ 2080.045809][T26817] copy_files+0xe6/0x200 [ 2080.050278][T26817] ? perf_event_attrs+0x30/0x30 [ 2080.054965][T26817] ? dup_task_struct+0xa60/0xa60 [ 2080.059748][T26817] ? security_task_alloc+0x132/0x150 [ 2080.064864][T26817] copy_process+0x11e9/0x3250 [ 2080.069376][T26817] ? check_stack_object+0xf7/0x130 [ 2080.074318][T26817] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2080.079790][T26817] ? copy_clone_args_from_user+0x6cf/0x790 [ 2080.085429][T26817] kernel_clone+0x22d/0x990 [ 2080.089770][T26817] ? dup_mmap+0xea0/0xea0 [ 2080.093943][T26817] ? create_io_thread+0x1e0/0x1e0 [ 2080.098796][T26817] ? file_end_write+0x1b0/0x1b0 [ 2080.103493][T26817] __x64_sys_clone3+0x375/0x3a0 [ 2080.108175][T26817] ? __ia32_sys_clone+0x300/0x300 [ 2080.113029][T26817] ? ksys_write+0x25f/0x2c0 [ 2080.117371][T26817] ? debug_smp_processor_id+0x17/0x20 [ 2080.122577][T26817] do_syscall_64+0x44/0xd0 [ 2080.126833][T26817] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2080.132557][T26817] RIP: 0033:0x7f8f8bc980c9 [ 2080.136911][T26817] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2080.156340][T26817] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2080.164582][T26817] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2080.172397][T26817] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 07:18:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:55 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 6) 07:18:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x2, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2080.180211][T26817] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2080.188045][T26817] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2080.195916][T26817] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2080.203730][T26817] [ 2080.245776][T26828] FAULT_INJECTION: forcing a failure. [ 2080.245776][T26828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2080.260925][T26828] CPU: 0 PID: 26828 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2080.270988][T26828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2080.280890][T26828] Call Trace: [ 2080.284006][T26828] [ 2080.286785][T26828] dump_stack_lvl+0x151/0x1b7 [ 2080.291301][T26828] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2080.296595][T26828] ? ext4_ext_release+0x10/0x10 [ 2080.301289][T26828] dump_stack+0x15/0x17 [ 2080.305282][T26828] should_fail+0x3c0/0x510 [ 2080.309533][T26828] should_fail_alloc_page+0x58/0x70 [ 2080.314564][T26828] __alloc_pages+0x1de/0x7c0 [ 2080.318989][T26828] ? __count_vm_events+0x30/0x30 [ 2080.323764][T26828] ? up_read+0x14/0x90 [ 2080.327669][T26828] push_pipe+0x34d/0x650 [ 2080.331745][T26828] pipe_zero+0x13d/0x4d0 [ 2080.335825][T26828] ? ext4_iomap_begin+0xa38/0xd90 [ 2080.340688][T26828] ? iov_iter_zero+0xd20/0xd20 07:18:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x19) [ 2080.345290][T26828] iov_iter_zero+0x3bc/0xd20 [ 2080.349772][T26828] ? ext4_alloc_da_blocks+0x180/0x180 [ 2080.354924][T26828] ? filemap_range_needs_writeback+0x870/0x870 [ 2080.360907][T26828] ? copy_page_from_iter+0x650/0x650 [ 2080.366029][T26828] ? ext4_alloc_da_blocks+0x180/0x180 [ 2080.371239][T26828] ? iomap_iter+0x67e/0x830 [ 2080.375584][T26828] ? __kasan_kmalloc+0x9/0x10 [ 2080.380091][T26828] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2080.385469][T26828] ? __iomap_dio_rw+0x2ed/0x2190 [ 2080.391023][T26828] __iomap_dio_rw+0x13d4/0x2190 [ 2080.395716][T26828] ? iomap_dio_complete+0x730/0x730 [ 2080.400746][T26828] ? ____kasan_kmalloc+0xee/0x110 [ 2080.405607][T26828] ? ____kasan_kmalloc+0xdc/0x110 [ 2080.410471][T26828] ? __kasan_kmalloc+0x9/0x10 [ 2080.414978][T26828] ? __kmalloc+0x203/0x350 [ 2080.419234][T26828] ? alloc_pipe_info+0x205/0x4b0 [ 2080.424007][T26828] ? splice_direct_to_actor+0xa3f/0xc10 [ 2080.429394][T26828] ? do_splice_direct+0x2a0/0x3f0 [ 2080.434252][T26828] ? down_read+0xf9/0x230 [ 2080.438419][T26828] iomap_dio_rw+0x3e/0x90 [ 2080.442586][T26828] ext4_file_read_iter+0x3ab/0x4b0 [ 2080.447533][T26828] generic_file_splice_read+0x479/0x760 [ 2080.452911][T26828] ? splice_shrink_spd+0xb0/0xb0 [ 2080.457680][T26828] ? selinux_file_permission+0x2ae/0x520 [ 2080.463151][T26828] ? rw_verify_area+0xa7/0x1c0 [ 2080.467750][T26828] splice_direct_to_actor+0x450/0xc10 [ 2080.473478][T26828] ? do_splice_direct+0x3f0/0x3f0 [ 2080.478336][T26828] ? pipe_to_sendpage+0x340/0x340 [ 2080.483213][T26828] ? rw_verify_area+0xa7/0x1c0 [ 2080.487795][T26828] do_splice_direct+0x2a0/0x3f0 [ 2080.492483][T26828] ? splice_direct_to_actor+0xc10/0xc10 [ 2080.497869][T26828] do_sendfile+0x63b/0xfd0 [ 2080.502122][T26828] ? __mutex_lock_slowpath+0x10/0x10 [ 2080.507250][T26828] ? do_pwritev+0x6a0/0x6a0 [ 2080.511580][T26828] ? ksys_write+0x25f/0x2c0 [ 2080.515917][T26828] __x64_sys_sendfile64+0x1ce/0x230 [ 2080.520953][T26828] ? __ia32_sys_sendfile+0x250/0x250 [ 2080.526070][T26828] ? debug_smp_processor_id+0x17/0x20 [ 2080.531282][T26828] do_syscall_64+0x44/0xd0 [ 2080.535532][T26828] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2080.541260][T26828] RIP: 0033:0x7f3e180a30c9 [ 2080.545517][T26828] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2080.564958][T26828] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2080.573203][T26828] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 [ 2080.581011][T26828] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 2080.588830][T26828] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 07:18:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 07:18:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x7, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2080.596637][T26828] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2080.604450][T26828] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2080.612262][T26828] 07:18:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 7) [ 2080.697846][T26845] FAULT_INJECTION: forcing a failure. [ 2080.697846][T26845] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2080.716557][T26845] CPU: 1 PID: 26845 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2080.726623][T26845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2080.736524][T26845] Call Trace: [ 2080.739645][T26845] [ 2080.742420][T26845] dump_stack_lvl+0x151/0x1b7 [ 2080.746936][T26845] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2080.752232][T26845] dump_stack+0x15/0x17 [ 2080.756221][T26845] should_fail+0x3c0/0x510 [ 2080.760475][T26845] should_fail_alloc_page+0x58/0x70 [ 2080.765509][T26845] __alloc_pages+0x1de/0x7c0 [ 2080.769937][T26845] ? __count_vm_events+0x30/0x30 [ 2080.774715][T26845] ? up_read+0x14/0x90 [ 2080.778726][T26845] push_pipe+0x34d/0x650 [ 2080.782780][T26845] pipe_zero+0x13d/0x4d0 [ 2080.786861][T26845] ? ext4_iomap_begin+0xa38/0xd90 [ 2080.786945][T26846] FAULT_INJECTION: forcing a failure. [ 2080.786945][T26846] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2080.791720][T26845] ? iov_iter_zero+0xd20/0xd20 [ 2080.791747][T26845] iov_iter_zero+0x3bc/0xd20 [ 2080.813766][T26845] ? ext4_alloc_da_blocks+0x180/0x180 [ 2080.818985][T26845] ? filemap_range_needs_writeback+0x870/0x870 [ 2080.824975][T26845] ? copy_page_from_iter+0x650/0x650 [ 2080.830086][T26845] ? ext4_alloc_da_blocks+0x180/0x180 [ 2080.835291][T26845] ? iomap_iter+0x67e/0x830 [ 2080.839630][T26845] ? __kasan_kmalloc+0x9/0x10 [ 2080.844143][T26845] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2080.849527][T26845] ? __iomap_dio_rw+0x2ed/0x2190 [ 2080.854301][T26845] __iomap_dio_rw+0x13d4/0x2190 [ 2080.858993][T26845] ? iomap_dio_complete+0x730/0x730 [ 2080.864021][T26845] ? ____kasan_kmalloc+0xee/0x110 [ 2080.868880][T26845] ? ____kasan_kmalloc+0xdc/0x110 [ 2080.873741][T26845] ? __kasan_kmalloc+0x9/0x10 [ 2080.878254][T26845] ? __kmalloc+0x203/0x350 [ 2080.882507][T26845] ? alloc_pipe_info+0x205/0x4b0 [ 2080.887280][T26845] ? splice_direct_to_actor+0xa3f/0xc10 [ 2080.892660][T26845] ? do_splice_direct+0x2a0/0x3f0 [ 2080.897523][T26845] ? down_read+0xf9/0x230 [ 2080.901690][T26845] iomap_dio_rw+0x3e/0x90 [ 2080.905854][T26845] ext4_file_read_iter+0x3ab/0x4b0 [ 2080.910805][T26845] generic_file_splice_read+0x479/0x760 [ 2080.916210][T26845] ? splice_shrink_spd+0xb0/0xb0 [ 2080.920957][T26845] ? selinux_file_permission+0x2ae/0x520 [ 2080.926431][T26845] ? rw_verify_area+0xa7/0x1c0 [ 2080.931111][T26845] splice_direct_to_actor+0x450/0xc10 [ 2080.936319][T26845] ? do_splice_direct+0x3f0/0x3f0 [ 2080.941181][T26845] ? pipe_to_sendpage+0x340/0x340 [ 2080.946039][T26845] ? rw_verify_area+0xa7/0x1c0 [ 2080.950640][T26845] do_splice_direct+0x2a0/0x3f0 [ 2080.955326][T26845] ? splice_direct_to_actor+0xc10/0xc10 [ 2080.960714][T26845] do_sendfile+0x63b/0xfd0 [ 2080.964962][T26845] ? __mutex_lock_slowpath+0x10/0x10 [ 2080.970085][T26845] ? do_pwritev+0x6a0/0x6a0 [ 2080.974422][T26845] ? ksys_write+0x25f/0x2c0 [ 2080.978764][T26845] __x64_sys_sendfile64+0x1ce/0x230 [ 2080.983794][T26845] ? __ia32_sys_sendfile+0x250/0x250 [ 2080.988917][T26845] ? debug_smp_processor_id+0x17/0x20 [ 2080.994124][T26845] do_syscall_64+0x44/0xd0 [ 2080.998377][T26845] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2081.004104][T26845] RIP: 0033:0x7f3e180a30c9 [ 2081.008360][T26845] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2081.027801][T26845] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2081.036045][T26845] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 07:18:56 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x19}, 0x0) [ 2081.043856][T26845] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 2081.051668][T26845] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2081.059480][T26845] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2081.067289][T26845] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2081.075106][T26845] [ 2081.077967][T26846] CPU: 0 PID: 26846 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2081.088040][T26846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2081.097931][T26846] Call Trace: [ 2081.101054][T26846] [ 2081.103844][T26846] dump_stack_lvl+0x151/0x1b7 [ 2081.108344][T26846] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2081.113639][T26846] dump_stack+0x15/0x17 [ 2081.117632][T26846] should_fail+0x3c0/0x510 [ 2081.121895][T26846] should_fail_alloc_page+0x58/0x70 [ 2081.126921][T26846] __alloc_pages+0x1de/0x7c0 [ 2081.131347][T26846] ? __count_vm_events+0x30/0x30 [ 2081.136120][T26846] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2081.141343][T26846] __get_free_pages+0xe/0x30 [ 2081.145758][T26846] kasan_populate_vmalloc_pte+0x39/0x130 [ 2081.151220][T26846] ? __apply_to_page_range+0x8a5/0xb90 [ 2081.156521][T26846] __apply_to_page_range+0x8b8/0xb90 [ 2081.161639][T26846] ? kasan_populate_vmalloc+0x70/0x70 [ 2081.166849][T26846] ? kasan_populate_vmalloc+0x70/0x70 [ 2081.172054][T26846] apply_to_page_range+0x3b/0x50 [ 2081.176833][T26846] kasan_populate_vmalloc+0x65/0x70 [ 2081.181859][T26846] alloc_vmap_area+0x1946/0x1a90 [ 2081.186639][T26846] ? vm_map_ram+0xa80/0xa80 [ 2081.190973][T26846] ? __kasan_kmalloc+0x9/0x10 07:18:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x300) [ 2081.195487][T26846] ? __get_vm_area_node+0x13a/0x380 [ 2081.200526][T26846] __get_vm_area_node+0x17b/0x380 [ 2081.205382][T26846] __vmalloc_node_range+0xda/0x800 [ 2081.210333][T26846] ? copy_process+0x579/0x3250 [ 2081.214934][T26846] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2081.219792][T26846] ? dup_task_struct+0x53/0xa60 [ 2081.224478][T26846] dup_task_struct+0x61f/0xa60 [ 2081.229083][T26846] ? copy_process+0x579/0x3250 [ 2081.233680][T26846] ? __kasan_check_write+0x14/0x20 [ 2081.238626][T26846] copy_process+0x579/0x3250 [ 2081.243051][T26846] ? check_stack_object+0xf7/0x130 [ 2081.248000][T26846] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2081.252949][T26846] ? copy_clone_args_from_user+0x6cf/0x790 [ 2081.258588][T26846] kernel_clone+0x22d/0x990 [ 2081.262928][T26846] ? dup_mmap+0xea0/0xea0 [ 2081.267095][T26846] ? create_io_thread+0x1e0/0x1e0 [ 2081.271956][T26846] ? file_end_write+0x1b0/0x1b0 [ 2081.276645][T26846] __x64_sys_clone3+0x375/0x3a0 [ 2081.281329][T26846] ? __ia32_sys_clone+0x300/0x300 [ 2081.286194][T26846] ? ksys_write+0x25f/0x2c0 [ 2081.290533][T26846] ? debug_smp_processor_id+0x17/0x20 [ 2081.295736][T26846] do_syscall_64+0x44/0xd0 [ 2081.299991][T26846] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2081.305717][T26846] RIP: 0033:0x7f8f8bc980c9 [ 2081.309970][T26846] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2081.329423][T26846] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2081.337658][T26846] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 07:18:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 8) [ 2081.345740][T26846] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2081.353553][T26846] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2081.361362][T26846] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2081.369175][T26846] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2081.376990][T26846] 07:18:57 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 07:18:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2081.399821][T26860] FAULT_INJECTION: forcing a failure. [ 2081.399821][T26860] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2081.433097][T26860] CPU: 1 PID: 26860 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2081.443169][T26860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2081.453150][T26860] Call Trace: [ 2081.456278][T26860] [ 2081.459055][T26860] dump_stack_lvl+0x151/0x1b7 [ 2081.463823][T26860] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2081.469119][T26860] dump_stack+0x15/0x17 [ 2081.473112][T26860] should_fail+0x3c0/0x510 [ 2081.477365][T26860] should_fail_alloc_page+0x58/0x70 [ 2081.482397][T26860] __alloc_pages+0x1de/0x7c0 [ 2081.483315][T26868] FAULT_INJECTION: forcing a failure. [ 2081.483315][T26868] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2081.486830][T26860] ? __count_vm_events+0x30/0x30 [ 2081.486859][T26860] ? up_read+0x14/0x90 [ 2081.486879][T26860] push_pipe+0x34d/0x650 [ 2081.512604][T26860] pipe_zero+0x13d/0x4d0 [ 2081.516682][T26860] ? ext4_iomap_begin+0xa38/0xd90 [ 2081.521543][T26860] ? iov_iter_zero+0xd20/0xd20 [ 2081.526142][T26860] iov_iter_zero+0x3bc/0xd20 [ 2081.530567][T26860] ? ext4_alloc_da_blocks+0x180/0x180 [ 2081.535777][T26860] ? filemap_range_needs_writeback+0x870/0x870 [ 2081.541762][T26860] ? copy_page_from_iter+0x650/0x650 [ 2081.546887][T26860] ? ext4_alloc_da_blocks+0x180/0x180 [ 2081.552094][T26860] ? iomap_iter+0x67e/0x830 [ 2081.556433][T26860] ? __kasan_kmalloc+0x9/0x10 [ 2081.560943][T26860] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2081.566325][T26860] ? __iomap_dio_rw+0x2ed/0x2190 [ 2081.571100][T26860] __iomap_dio_rw+0x13d4/0x2190 [ 2081.575792][T26860] ? iomap_dio_complete+0x730/0x730 [ 2081.580822][T26860] ? ____kasan_kmalloc+0xee/0x110 [ 2081.585682][T26860] ? ____kasan_kmalloc+0xdc/0x110 [ 2081.590544][T26860] ? __kasan_kmalloc+0x9/0x10 [ 2081.595054][T26860] ? __kmalloc+0x203/0x350 [ 2081.599318][T26860] ? alloc_pipe_info+0x205/0x4b0 [ 2081.604078][T26860] ? splice_direct_to_actor+0xa3f/0xc10 [ 2081.609463][T26860] ? do_splice_direct+0x2a0/0x3f0 [ 2081.614323][T26860] ? down_read+0xf9/0x230 [ 2081.618490][T26860] iomap_dio_rw+0x3e/0x90 [ 2081.622661][T26860] ext4_file_read_iter+0x3ab/0x4b0 [ 2081.627603][T26860] generic_file_splice_read+0x479/0x760 [ 2081.632984][T26860] ? splice_shrink_spd+0xb0/0xb0 [ 2081.637756][T26860] ? selinux_file_permission+0x2ae/0x520 [ 2081.643228][T26860] ? rw_verify_area+0xa7/0x1c0 [ 2081.647827][T26860] splice_direct_to_actor+0x450/0xc10 [ 2081.653035][T26860] ? do_splice_direct+0x3f0/0x3f0 [ 2081.657895][T26860] ? pipe_to_sendpage+0x340/0x340 [ 2081.662759][T26860] ? rw_verify_area+0xa7/0x1c0 [ 2081.667358][T26860] do_splice_direct+0x2a0/0x3f0 [ 2081.672042][T26860] ? splice_direct_to_actor+0xc10/0xc10 [ 2081.677425][T26860] do_sendfile+0x63b/0xfd0 [ 2081.681680][T26860] ? __mutex_lock_slowpath+0x10/0x10 [ 2081.686799][T26860] ? do_pwritev+0x6a0/0x6a0 [ 2081.691156][T26860] ? ksys_write+0x25f/0x2c0 [ 2081.695479][T26860] __x64_sys_sendfile64+0x1ce/0x230 [ 2081.700509][T26860] ? __ia32_sys_sendfile+0x250/0x250 [ 2081.705634][T26860] ? debug_smp_processor_id+0x17/0x20 [ 2081.710845][T26860] do_syscall_64+0x44/0xd0 [ 2081.715092][T26860] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2081.720822][T26860] RIP: 0033:0x7f3e180a30c9 [ 2081.725080][T26860] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2081.744517][T26860] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2081.752759][T26860] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 [ 2081.760578][T26860] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 [ 2081.768385][T26860] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2081.776196][T26860] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2081.784006][T26860] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2081.791820][T26860] [ 2081.796931][T26868] CPU: 0 PID: 26868 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2081.807167][T26868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2081.817064][T26868] Call Trace: [ 2081.820183][T26868] [ 2081.822966][T26868] dump_stack_lvl+0x151/0x1b7 [ 2081.827570][T26868] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2081.832861][T26868] dump_stack+0x15/0x17 [ 2081.836850][T26868] should_fail+0x3c0/0x510 [ 2081.841106][T26868] should_fail_alloc_page+0x58/0x70 [ 2081.846142][T26868] __alloc_pages+0x1de/0x7c0 [ 2081.850564][T26868] ? __count_vm_events+0x30/0x30 [ 2081.855345][T26868] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2081.860546][T26868] __get_free_pages+0xe/0x30 [ 2081.864979][T26868] kasan_populate_vmalloc_pte+0x39/0x130 [ 2081.870526][T26868] ? __apply_to_page_range+0x8a5/0xb90 [ 2081.875823][T26868] __apply_to_page_range+0x8b8/0xb90 [ 2081.881027][T26868] ? kasan_populate_vmalloc+0x70/0x70 [ 2081.886236][T26868] ? kasan_populate_vmalloc+0x70/0x70 [ 2081.891444][T26868] apply_to_page_range+0x3b/0x50 [ 2081.896393][T26868] kasan_populate_vmalloc+0x65/0x70 [ 2081.901771][T26868] alloc_vmap_area+0x1946/0x1a90 [ 2081.906548][T26868] ? vm_map_ram+0xa80/0xa80 [ 2081.910883][T26868] ? __kasan_kmalloc+0x9/0x10 [ 2081.915399][T26868] ? __get_vm_area_node+0x13a/0x380 [ 2081.920434][T26868] __get_vm_area_node+0x17b/0x380 [ 2081.925294][T26868] __vmalloc_node_range+0xda/0x800 [ 2081.930242][T26868] ? copy_process+0x579/0x3250 [ 2081.934840][T26868] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2081.939719][T26868] ? dup_task_struct+0x53/0xa60 [ 2081.944559][T26868] dup_task_struct+0x61f/0xa60 [ 2081.949164][T26868] ? copy_process+0x579/0x3250 [ 2081.953760][T26868] ? __kasan_check_write+0x14/0x20 [ 2081.958709][T26868] copy_process+0x579/0x3250 [ 2081.963139][T26868] ? check_stack_object+0xf7/0x130 [ 2081.968106][T26868] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2081.973034][T26868] ? copy_clone_args_from_user+0x6cf/0x790 [ 2081.978676][T26868] kernel_clone+0x22d/0x990 [ 2081.983016][T26868] ? dup_mmap+0xea0/0xea0 [ 2081.987199][T26868] ? create_io_thread+0x1e0/0x1e0 [ 2081.992209][T26868] ? file_end_write+0x1b0/0x1b0 [ 2081.996897][T26868] __x64_sys_clone3+0x375/0x3a0 [ 2082.001581][T26868] ? __ia32_sys_clone+0x300/0x300 [ 2082.006616][T26868] ? ksys_write+0x25f/0x2c0 [ 2082.010958][T26868] ? debug_smp_processor_id+0x17/0x20 [ 2082.016251][T26868] do_syscall_64+0x44/0xd0 [ 2082.020499][T26868] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2082.026229][T26868] RIP: 0033:0x7f8f8bc980c9 [ 2082.030484][T26868] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:18:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x500) 07:18:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) (fail_nth: 9) [ 2082.049936][T26868] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2082.058168][T26868] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2082.065981][T26868] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2082.073792][T26868] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2082.081602][T26868] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2082.089414][T26868] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2082.097230][T26868] 07:18:57 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x300}, 0x0) 07:18:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x9, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2082.139607][T26879] FAULT_INJECTION: forcing a failure. [ 2082.139607][T26879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2082.162791][T26879] CPU: 0 PID: 26879 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2082.172865][T26879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2082.182756][T26879] Call Trace: [ 2082.185884][T26879] [ 2082.188658][T26879] dump_stack_lvl+0x151/0x1b7 [ 2082.193596][T26879] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2082.198890][T26879] dump_stack+0x15/0x17 [ 2082.202979][T26879] should_fail+0x3c0/0x510 [ 2082.207225][T26879] should_fail_alloc_page+0x58/0x70 [ 2082.212256][T26879] __alloc_pages+0x1de/0x7c0 [ 2082.216685][T26879] ? __count_vm_events+0x30/0x30 [ 2082.221455][T26879] ? up_read+0x14/0x90 [ 2082.225365][T26879] push_pipe+0x34d/0x650 [ 2082.229445][T26879] pipe_zero+0x13d/0x4d0 [ 2082.233521][T26879] ? ext4_iomap_begin+0xa38/0xd90 [ 2082.238381][T26879] ? iov_iter_zero+0xd20/0xd20 [ 2082.242981][T26879] iov_iter_zero+0x3bc/0xd20 [ 2082.247411][T26879] ? ext4_alloc_da_blocks+0x180/0x180 [ 2082.252616][T26879] ? filemap_range_needs_writeback+0x870/0x870 [ 2082.258602][T26879] ? copy_page_from_iter+0x650/0x650 [ 2082.263723][T26879] ? ext4_alloc_da_blocks+0x180/0x180 [ 2082.268933][T26879] ? iomap_iter+0x67e/0x830 [ 2082.273269][T26879] ? __kasan_kmalloc+0x9/0x10 [ 2082.277789][T26879] ? kmem_cache_alloc_trace+0x1e3/0x310 [ 2082.283164][T26879] ? __iomap_dio_rw+0x2ed/0x2190 [ 2082.287958][T26879] __iomap_dio_rw+0x13d4/0x2190 [ 2082.292642][T26879] ? iomap_dio_complete+0x730/0x730 [ 2082.297662][T26879] ? ____kasan_kmalloc+0xee/0x110 [ 2082.302520][T26879] ? ____kasan_kmalloc+0xdc/0x110 [ 2082.307382][T26879] ? __kasan_kmalloc+0x9/0x10 [ 2082.311902][T26879] ? __kmalloc+0x203/0x350 [ 2082.316147][T26879] ? alloc_pipe_info+0x205/0x4b0 [ 2082.320922][T26879] ? splice_direct_to_actor+0xa3f/0xc10 [ 2082.326312][T26879] ? do_splice_direct+0x2a0/0x3f0 [ 2082.331165][T26879] ? down_read+0xf9/0x230 [ 2082.335329][T26879] iomap_dio_rw+0x3e/0x90 [ 2082.339495][T26879] ext4_file_read_iter+0x3ab/0x4b0 [ 2082.344442][T26879] generic_file_splice_read+0x479/0x760 [ 2082.349825][T26879] ? splice_shrink_spd+0xb0/0xb0 [ 2082.354596][T26879] ? selinux_file_permission+0x2ae/0x520 [ 2082.360070][T26879] ? rw_verify_area+0xa7/0x1c0 [ 2082.364665][T26879] splice_direct_to_actor+0x450/0xc10 [ 2082.369875][T26879] ? do_splice_direct+0x3f0/0x3f0 [ 2082.374739][T26879] ? pipe_to_sendpage+0x340/0x340 [ 2082.379595][T26879] ? rw_verify_area+0xa7/0x1c0 [ 2082.384219][T26879] do_splice_direct+0x2a0/0x3f0 [ 2082.388882][T26879] ? splice_direct_to_actor+0xc10/0xc10 [ 2082.394266][T26879] do_sendfile+0x63b/0xfd0 [ 2082.398516][T26879] ? __mutex_lock_slowpath+0x10/0x10 [ 2082.403644][T26879] ? do_pwritev+0x6a0/0x6a0 [ 2082.407977][T26879] ? __kasan_check_write+0x14/0x20 [ 2082.412921][T26879] ? fpregs_restore_userregs+0x1f0/0x3a0 [ 2082.418398][T26879] __x64_sys_sendfile64+0x1ce/0x230 [ 2082.423428][T26879] ? __ia32_sys_sendfile+0x250/0x250 [ 2082.428551][T26879] ? switch_fpu_return+0xe/0x10 [ 2082.433234][T26879] do_syscall_64+0x44/0xd0 [ 2082.437490][T26879] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2082.443216][T26879] RIP: 0033:0x7f3e180a30c9 [ 2082.447472][T26879] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2082.466915][T26879] RSP: 002b:00007f3e16e16168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2082.475156][T26879] RAX: ffffffffffffffda RBX: 00007f3e181c2f80 RCX: 00007f3e180a30c9 [ 2082.482971][T26879] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000005 07:18:58 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:18:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) [ 2082.490777][T26879] RBP: 00007f3e16e161d0 R08: 0000000000000000 R09: 0000000000000000 [ 2082.498591][T26879] R10: 0000000000010000 R11: 0000000000000246 R12: 0000000000000001 [ 2082.506404][T26879] R13: 00007ffc5ddb4b1f R14: 00007f3e16e16300 R15: 0000000000022000 [ 2082.514217][T26879] 07:18:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:18:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x70, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2082.627242][T26890] FAULT_INJECTION: forcing a failure. [ 2082.627242][T26890] name failslab, interval 1, probability 0, space 0, times 0 [ 2082.657916][T26890] CPU: 1 PID: 26890 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2082.667982][T26890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2082.677883][T26890] Call Trace: [ 2082.681007][T26890] [ 2082.683783][T26890] dump_stack_lvl+0x151/0x1b7 [ 2082.688299][T26890] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2082.693600][T26890] dump_stack+0x15/0x17 [ 2082.697582][T26890] should_fail+0x3c0/0x510 [ 2082.701837][T26890] ? kvmalloc_node+0x82/0x130 [ 2082.706352][T26890] __should_failslab+0x9f/0xe0 [ 2082.710948][T26890] should_failslab+0x9/0x20 [ 2082.715289][T26890] __kmalloc+0x6d/0x350 [ 2082.719283][T26890] ? kvmalloc_node+0x82/0x130 [ 2082.723796][T26890] kvmalloc_node+0x82/0x130 [ 2082.728140][T26890] alloc_fdtable+0x173/0x2b0 [ 2082.732562][T26890] dup_fd+0x781/0xa40 [ 2082.736379][T26890] ? avc_has_perm+0x16d/0x260 [ 2082.740895][T26890] copy_files+0xe6/0x200 [ 2082.744971][T26890] ? perf_event_attrs+0x30/0x30 [ 2082.749661][T26890] ? dup_task_struct+0xa60/0xa60 [ 2082.754442][T26890] ? security_task_alloc+0x132/0x150 [ 2082.759561][T26890] copy_process+0x11e9/0x3250 [ 2082.764068][T26890] ? check_stack_object+0xf7/0x130 [ 2082.769019][T26890] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2082.773964][T26890] ? copy_clone_args_from_user+0x6cf/0x790 [ 2082.779609][T26890] kernel_clone+0x22d/0x990 [ 2082.783946][T26890] ? dup_mmap+0xea0/0xea0 [ 2082.788109][T26890] ? create_io_thread+0x1e0/0x1e0 [ 2082.792973][T26890] ? file_end_write+0x1b0/0x1b0 [ 2082.797658][T26890] __x64_sys_clone3+0x375/0x3a0 [ 2082.802604][T26890] ? __ia32_sys_clone+0x300/0x300 [ 2082.807467][T26890] ? ksys_write+0x25f/0x2c0 [ 2082.811806][T26890] ? debug_smp_processor_id+0x17/0x20 [ 2082.817012][T26890] do_syscall_64+0x44/0xd0 [ 2082.821267][T26890] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2082.826996][T26890] RIP: 0033:0x7f8f8bc980c9 [ 2082.831249][T26890] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2082.850691][T26890] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2082.858936][T26890] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2082.866746][T26890] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 07:18:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 07:18:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x700, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2082.874559][T26890] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2082.882370][T26890] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2082.890186][T26890] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2082.897995][T26890] 07:18:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x600) 07:18:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10000) [ 2082.995189][T26912] FAULT_INJECTION: forcing a failure. [ 2082.995189][T26912] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.010187][T26912] CPU: 1 PID: 26912 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2083.020251][T26912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2083.030148][T26912] Call Trace: [ 2083.033271][T26912] [ 2083.036049][T26912] dump_stack_lvl+0x151/0x1b7 07:18:58 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x500}, 0x0) [ 2083.040564][T26912] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2083.045857][T26912] dump_stack+0x15/0x17 [ 2083.049848][T26912] should_fail+0x3c0/0x510 [ 2083.054100][T26912] ? __vmalloc_node_range+0x2e3/0x800 [ 2083.059309][T26912] __should_failslab+0x9f/0xe0 [ 2083.063909][T26912] should_failslab+0x9/0x20 [ 2083.068249][T26912] __kmalloc+0x6d/0x350 [ 2083.072242][T26912] __vmalloc_node_range+0x2e3/0x800 [ 2083.077276][T26912] dup_task_struct+0x61f/0xa60 [ 2083.081878][T26912] ? copy_process+0x579/0x3250 [ 2083.086479][T26912] ? __kasan_check_write+0x14/0x20 [ 2083.091429][T26912] copy_process+0x579/0x3250 [ 2083.095855][T26912] ? check_stack_object+0xf7/0x130 [ 2083.100793][T26912] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2083.105740][T26912] ? copy_clone_args_from_user+0x6cf/0x790 [ 2083.111390][T26912] kernel_clone+0x22d/0x990 [ 2083.115725][T26912] ? dup_mmap+0xea0/0xea0 [ 2083.119889][T26912] ? create_io_thread+0x1e0/0x1e0 [ 2083.124746][T26912] ? file_end_write+0x1b0/0x1b0 [ 2083.129440][T26912] __x64_sys_clone3+0x375/0x3a0 [ 2083.134122][T26912] ? __ia32_sys_clone+0x300/0x300 [ 2083.138982][T26912] ? ksys_write+0x25f/0x2c0 [ 2083.143330][T26912] ? debug_smp_processor_id+0x17/0x20 [ 2083.148529][T26912] do_syscall_64+0x44/0xd0 [ 2083.152790][T26912] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2083.158517][T26912] RIP: 0033:0x7f8f8bc980c9 [ 2083.162770][T26912] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2083.182219][T26912] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:18:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 07:18:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2083.190806][T26912] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2083.198617][T26912] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2083.206425][T26912] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2083.214238][T26912] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2083.222048][T26912] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2083.229862][T26912] [ 2083.333163][T26927] FAULT_INJECTION: forcing a failure. [ 2083.333163][T26927] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.359583][T26927] CPU: 0 PID: 26927 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2083.369634][T26927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2083.379539][T26927] Call Trace: [ 2083.382657][T26927] [ 2083.385436][T26927] dump_stack_lvl+0x151/0x1b7 [ 2083.389948][T26927] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2083.395241][T26927] dump_stack+0x15/0x17 [ 2083.399240][T26927] should_fail+0x3c0/0x510 [ 2083.403488][T26927] __should_failslab+0x9f/0xe0 [ 2083.408089][T26927] should_failslab+0x9/0x20 [ 2083.412434][T26927] kmem_cache_alloc+0x4f/0x2f0 [ 2083.417033][T26927] ? copy_sighand+0x54/0x250 [ 2083.421451][T26927] ? _raw_spin_unlock+0x4d/0x70 [ 2083.426137][T26927] copy_sighand+0x54/0x250 [ 2083.430393][T26927] copy_process+0x123f/0x3250 [ 2083.434911][T26927] ? check_stack_object+0xf7/0x130 [ 2083.439854][T26927] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2083.444798][T26927] ? copy_clone_args_from_user+0x6cf/0x790 [ 2083.450444][T26927] kernel_clone+0x22d/0x990 [ 2083.454777][T26927] ? dup_mmap+0xea0/0xea0 [ 2083.458943][T26927] ? create_io_thread+0x1e0/0x1e0 [ 2083.463808][T26927] ? file_end_write+0x1b0/0x1b0 [ 2083.468496][T26927] __x64_sys_clone3+0x375/0x3a0 [ 2083.473185][T26927] ? __ia32_sys_clone+0x300/0x300 [ 2083.478044][T26927] ? ksys_write+0x25f/0x2c0 [ 2083.482382][T26927] ? debug_smp_processor_id+0x17/0x20 [ 2083.487588][T26927] do_syscall_64+0x44/0xd0 [ 2083.491839][T26927] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2083.497569][T26927] RIP: 0033:0x7f8f8bc980c9 [ 2083.501825][T26927] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2083.521268][T26927] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:18:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x4aa) 07:18:59 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r2 = socket(0x840000000002, 0x3, 0xff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r2, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r1, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00'}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) [ 2083.529511][T26927] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2083.537320][T26927] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2083.545131][T26927] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2083.552941][T26927] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2083.560755][T26927] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2083.568571][T26927] 07:18:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:18:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x600) 07:18:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 07:18:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xa00) 07:18:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xc00) [ 2083.711131][T26946] FAULT_INJECTION: forcing a failure. [ 2083.711131][T26946] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.724169][T26946] CPU: 1 PID: 26946 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2083.734233][T26946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2083.744123][T26946] Call Trace: [ 2083.747249][T26946] [ 2083.750026][T26946] dump_stack_lvl+0x151/0x1b7 [ 2083.754540][T26946] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2083.759833][T26946] dump_stack+0x15/0x17 [ 2083.763825][T26946] should_fail+0x3c0/0x510 [ 2083.768080][T26946] __should_failslab+0x9f/0xe0 [ 2083.772678][T26946] should_failslab+0x9/0x20 [ 2083.777020][T26946] kmem_cache_alloc+0x4f/0x2f0 [ 2083.781619][T26946] ? copy_signal+0x55/0x610 [ 2083.785958][T26946] copy_signal+0x55/0x610 [ 2083.790123][T26946] copy_process+0x126a/0x3250 [ 2083.794638][T26946] ? check_stack_object+0xf7/0x130 [ 2083.799586][T26946] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2083.804533][T26946] ? copy_clone_args_from_user+0x6cf/0x790 [ 2083.810174][T26946] kernel_clone+0x22d/0x990 [ 2083.814514][T26946] ? dup_mmap+0xea0/0xea0 [ 2083.818681][T26946] ? create_io_thread+0x1e0/0x1e0 [ 2083.823540][T26946] ? file_end_write+0x1b0/0x1b0 [ 2083.828228][T26946] __x64_sys_clone3+0x375/0x3a0 [ 2083.832915][T26946] ? __ia32_sys_clone+0x300/0x300 [ 2083.837776][T26946] ? ksys_write+0x25f/0x2c0 [ 2083.842114][T26946] ? debug_smp_processor_id+0x17/0x20 [ 2083.847324][T26946] do_syscall_64+0x44/0xd0 [ 2083.851574][T26946] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2083.857303][T26946] RIP: 0033:0x7f8f8bc980c9 [ 2083.861558][T26946] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2083.880997][T26946] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2083.889242][T26946] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2083.897058][T26946] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 07:18:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x700) 07:18:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xe00) [ 2083.904867][T26946] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2083.912678][T26946] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2083.920490][T26946] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2083.928305][T26946] 07:18:59 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x600}, 0x0) 07:18:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x1f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:18:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 07:18:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1200) [ 2084.049727][T26956] FAULT_INJECTION: forcing a failure. [ 2084.049727][T26956] name failslab, interval 1, probability 0, space 0, times 0 [ 2084.062393][T26956] CPU: 1 PID: 26956 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2084.072443][T26956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2084.082337][T26956] Call Trace: [ 2084.085470][T26956] [ 2084.088243][T26956] dump_stack_lvl+0x151/0x1b7 [ 2084.092756][T26956] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2084.098055][T26956] dump_stack+0x15/0x17 [ 2084.102042][T26956] should_fail+0x3c0/0x510 [ 2084.106389][T26956] __should_failslab+0x9f/0xe0 [ 2084.110986][T26956] should_failslab+0x9/0x20 [ 2084.115335][T26956] kmem_cache_alloc+0x4f/0x2f0 [ 2084.119930][T26956] ? dup_mm+0x29/0x330 [ 2084.123833][T26956] dup_mm+0x29/0x330 [ 2084.127561][T26956] copy_mm+0x108/0x1b0 [ 2084.131467][T26956] copy_process+0x1295/0x3250 [ 2084.135982][T26956] ? check_stack_object+0xf7/0x130 [ 2084.140944][T26956] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2084.145881][T26956] ? copy_clone_args_from_user+0x6cf/0x790 [ 2084.151522][T26956] kernel_clone+0x22d/0x990 [ 2084.155859][T26956] ? dup_mmap+0xea0/0xea0 [ 2084.160022][T26956] ? create_io_thread+0x1e0/0x1e0 [ 2084.164891][T26956] ? file_end_write+0x1b0/0x1b0 [ 2084.169570][T26956] __x64_sys_clone3+0x375/0x3a0 [ 2084.174264][T26956] ? __ia32_sys_clone+0x300/0x300 [ 2084.179123][T26956] ? ksys_write+0x25f/0x2c0 [ 2084.183461][T26956] ? debug_smp_processor_id+0x17/0x20 [ 2084.188675][T26956] do_syscall_64+0x44/0xd0 [ 2084.192926][T26956] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2084.198647][T26956] RIP: 0033:0x7f8f8bc980c9 [ 2084.202901][T26956] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2084.222344][T26956] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2084.230586][T26956] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2084.238402][T26956] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2084.246209][T26956] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2084.254111][T26956] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2084.261920][T26956] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2084.269731][T26956] 07:19:00 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r2 = socket(0x840000000002, 0x3, 0xff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r2, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r1, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00'}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1400) 07:19:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 13) 07:19:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1600) 07:19:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1800) [ 2084.608111][T26984] FAULT_INJECTION: forcing a failure. [ 2084.608111][T26984] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2084.621937][T26984] CPU: 0 PID: 26984 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2084.632113][T26984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2084.642008][T26984] Call Trace: [ 2084.645132][T26984] [ 2084.647908][T26984] dump_stack_lvl+0x151/0x1b7 [ 2084.652421][T26984] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2084.657721][T26984] dump_stack+0x15/0x17 [ 2084.661710][T26984] should_fail+0x3c0/0x510 [ 2084.665961][T26984] should_fail_alloc_page+0x58/0x70 [ 2084.671006][T26984] __alloc_pages+0x1de/0x7c0 [ 2084.675432][T26984] ? __count_vm_events+0x30/0x30 [ 2084.680196][T26984] ? __kasan_kmalloc+0x9/0x10 [ 2084.684708][T26984] ? __kmalloc+0x203/0x350 [ 2084.688963][T26984] ? __vmalloc_node_range+0x2e3/0x800 [ 2084.695733][T26984] __vmalloc_node_range+0x48f/0x800 [ 2084.700768][T26984] dup_task_struct+0x61f/0xa60 [ 2084.705462][T26984] ? copy_process+0x579/0x3250 [ 2084.710064][T26984] ? __kasan_check_write+0x14/0x20 [ 2084.715017][T26984] copy_process+0x579/0x3250 [ 2084.719558][T26984] ? check_stack_object+0xf7/0x130 [ 2084.724473][T26984] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2084.729417][T26984] ? copy_clone_args_from_user+0x6cf/0x790 [ 2084.735066][T26984] kernel_clone+0x22d/0x990 [ 2084.739397][T26984] ? dup_mmap+0xea0/0xea0 [ 2084.743568][T26984] ? create_io_thread+0x1e0/0x1e0 [ 2084.748422][T26984] ? file_end_write+0x1b0/0x1b0 [ 2084.753109][T26984] __x64_sys_clone3+0x375/0x3a0 [ 2084.757798][T26984] ? __ia32_sys_clone+0x300/0x300 [ 2084.762658][T26984] ? ksys_write+0x25f/0x2c0 [ 2084.766998][T26984] ? debug_smp_processor_id+0x17/0x20 [ 2084.772204][T26984] do_syscall_64+0x44/0xd0 [ 2084.776458][T26984] ? irqentry_exit+0x12/0x40 [ 2084.780892][T26984] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2084.786614][T26984] RIP: 0033:0x7f8f8bc980c9 [ 2084.790867][T26984] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2084.810306][T26984] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2084.818559][T26984] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2084.826363][T26984] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2084.834180][T26984] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2084.841990][T26984] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2084.849798][T26984] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 07:19:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x900) 07:19:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1a00) 07:19:00 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x700}, 0x0) 07:19:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 14) 07:19:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2084.857614][T26984] 07:19:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1c00) [ 2084.928148][T26999] FAULT_INJECTION: forcing a failure. [ 2084.928148][T26999] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2084.941612][T26999] CPU: 1 PID: 26999 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2084.951676][T26999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2084.961568][T26999] Call Trace: [ 2084.964693][T26999] [ 2084.967472][T26999] dump_stack_lvl+0x151/0x1b7 [ 2084.972010][T26999] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2084.977279][T26999] dump_stack+0x15/0x17 [ 2084.981267][T26999] should_fail+0x3c0/0x510 [ 2084.985530][T26999] should_fail_alloc_page+0x58/0x70 [ 2084.990562][T26999] __alloc_pages+0x1de/0x7c0 [ 2084.994984][T26999] ? __count_vm_events+0x30/0x30 [ 2084.999757][T26999] ? __kasan_kmalloc+0x9/0x10 [ 2085.004267][T26999] ? __kmalloc+0x203/0x350 [ 2085.008521][T26999] ? __vmalloc_node_range+0x2e3/0x800 [ 2085.013732][T26999] __vmalloc_node_range+0x48f/0x800 [ 2085.018764][T26999] dup_task_struct+0x61f/0xa60 [ 2085.023363][T26999] ? copy_process+0x579/0x3250 [ 2085.027962][T26999] ? __kasan_check_write+0x14/0x20 [ 2085.032910][T26999] copy_process+0x579/0x3250 [ 2085.037514][T26999] ? check_stack_object+0xf7/0x130 [ 2085.042464][T26999] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2085.047408][T26999] ? copy_clone_args_from_user+0x6cf/0x790 [ 2085.053047][T26999] kernel_clone+0x22d/0x990 [ 2085.057387][T26999] ? dup_mmap+0xea0/0xea0 [ 2085.061555][T26999] ? create_io_thread+0x1e0/0x1e0 [ 2085.066413][T26999] ? file_end_write+0x1b0/0x1b0 [ 2085.071100][T26999] __x64_sys_clone3+0x375/0x3a0 [ 2085.075787][T26999] ? __ia32_sys_clone+0x300/0x300 [ 2085.080651][T26999] ? ksys_write+0x25f/0x2c0 [ 2085.084988][T26999] ? debug_smp_processor_id+0x17/0x20 [ 2085.090195][T26999] do_syscall_64+0x44/0xd0 [ 2085.094451][T26999] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2085.100175][T26999] RIP: 0033:0x7f8f8bc980c9 [ 2085.104430][T26999] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2085.123870][T26999] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2085.132114][T26999] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2085.139929][T26999] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2085.147737][T26999] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2085.155555][T26999] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2085.163362][T26999] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2085.171176][T26999] 07:19:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 15) 07:19:00 executing program 4: syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r2 = socket(0x840000000002, 0x3, 0xff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r4]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r2, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r2, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r1, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r2, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r5, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r6, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r7, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r5, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r5, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00'}, 0x10) r8 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r8, 0x800) lseek(r8, 0x200, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r8, r9, 0x0, 0x10000) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) writev(r10, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1e00) 07:19:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x7000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2085.327697][T27011] FAULT_INJECTION: forcing a failure. [ 2085.327697][T27011] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.347177][T27011] CPU: 1 PID: 27011 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2085.357250][T27011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2085.367145][T27011] Call Trace: [ 2085.370268][T27011] [ 2085.373044][T27011] dump_stack_lvl+0x151/0x1b7 [ 2085.377559][T27011] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2085.382859][T27011] dump_stack+0x15/0x17 [ 2085.386847][T27011] should_fail+0x3c0/0x510 [ 2085.391100][T27011] __should_failslab+0x9f/0xe0 [ 2085.395700][T27011] should_failslab+0x9/0x20 [ 2085.400043][T27011] kmem_cache_alloc+0x4f/0x2f0 [ 2085.404640][T27011] ? vm_area_dup+0x26/0x1d0 [ 2085.408978][T27011] vm_area_dup+0x26/0x1d0 [ 2085.413147][T27011] dup_mmap+0x6b8/0xea0 [ 2085.417138][T27011] ? __delayed_free_task+0x20/0x20 [ 2085.422084][T27011] ? mm_init+0x807/0x960 [ 2085.426287][T27011] dup_mm+0x91/0x330 [ 2085.430015][T27011] copy_mm+0x108/0x1b0 [ 2085.433923][T27011] copy_process+0x1295/0x3250 [ 2085.438444][T27011] ? check_stack_object+0xf7/0x130 [ 2085.443381][T27011] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2085.448332][T27011] ? copy_clone_args_from_user+0x6cf/0x790 [ 2085.453972][T27011] kernel_clone+0x22d/0x990 [ 2085.458308][T27011] ? dup_mmap+0xea0/0xea0 [ 2085.462473][T27011] ? create_io_thread+0x1e0/0x1e0 [ 2085.467334][T27011] ? file_end_write+0x1b0/0x1b0 [ 2085.472025][T27011] __x64_sys_clone3+0x375/0x3a0 [ 2085.476709][T27011] ? __ia32_sys_clone+0x300/0x300 [ 2085.481573][T27011] ? ksys_write+0x25f/0x2c0 [ 2085.485914][T27011] ? debug_smp_processor_id+0x17/0x20 [ 2085.491116][T27011] do_syscall_64+0x44/0xd0 [ 2085.495371][T27011] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2085.501100][T27011] RIP: 0033:0x7f8f8bc980c9 [ 2085.505351][T27011] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:01 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x2000) 07:19:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x10fff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2085.524793][T27011] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2085.533040][T27011] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2085.540881][T27011] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2085.548660][T27011] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2085.556474][T27011] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2085.564286][T27011] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2085.572099][T27011] 07:19:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 16) 07:19:01 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x2200) 07:19:01 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x900}, 0x0) 07:19:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x1900) 07:19:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:01 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x2400) [ 2085.781668][T27032] FAULT_INJECTION: forcing a failure. [ 2085.781668][T27032] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.794857][T27032] CPU: 1 PID: 27032 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2085.804914][T27032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2085.814809][T27032] Call Trace: [ 2085.817937][T27032] [ 2085.820713][T27032] dump_stack_lvl+0x151/0x1b7 [ 2085.825226][T27032] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2085.830525][T27032] ? __this_cpu_preempt_check+0x13/0x20 [ 2085.835905][T27032] dump_stack+0x15/0x17 [ 2085.839898][T27032] should_fail+0x3c0/0x510 [ 2085.844149][T27032] __should_failslab+0x9f/0xe0 [ 2085.848754][T27032] should_failslab+0x9/0x20 [ 2085.853088][T27032] kmem_cache_alloc+0x4f/0x2f0 [ 2085.857689][T27032] ? __kasan_check_write+0x14/0x20 [ 2085.862636][T27032] ? prepare_creds+0x30/0x690 [ 2085.867149][T27032] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 2085.872447][T27032] prepare_creds+0x30/0x690 [ 2085.876793][T27032] copy_creds+0xde/0x640 [ 2085.880865][T27032] copy_process+0x775/0x3250 [ 2085.885294][T27032] ? check_stack_object+0xf7/0x130 [ 2085.890238][T27032] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2085.895183][T27032] ? copy_clone_args_from_user+0x6cf/0x790 [ 2085.901002][T27032] kernel_clone+0x22d/0x990 [ 2085.905336][T27032] ? dup_mmap+0xea0/0xea0 [ 2085.909505][T27032] ? create_io_thread+0x1e0/0x1e0 [ 2085.914369][T27032] ? file_end_write+0x1b0/0x1b0 [ 2085.919054][T27032] __x64_sys_clone3+0x375/0x3a0 [ 2085.923737][T27032] ? __ia32_sys_clone+0x300/0x300 [ 2085.928603][T27032] ? ksys_write+0x25f/0x2c0 [ 2085.932942][T27032] ? debug_smp_processor_id+0x17/0x20 [ 2085.938167][T27032] do_syscall_64+0x44/0xd0 [ 2085.942406][T27032] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2085.948127][T27032] RIP: 0033:0x7f8f8bc980c9 [ 2085.952382][T27032] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2085.971839][T27032] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2085.980070][T27032] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2085.987881][T27032] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2085.995695][T27032] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2086.003505][T27032] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2086.011317][T27032] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2086.019215][T27032] 07:19:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 17) 07:19:01 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x2600) 07:19:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:01 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) [ 2086.270931][T27054] FAULT_INJECTION: forcing a failure. [ 2086.270931][T27054] name failslab, interval 1, probability 0, space 0, times 0 [ 2086.293162][T27054] CPU: 1 PID: 27054 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2086.303246][T27054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2086.313135][T27054] Call Trace: [ 2086.316258][T27054] [ 2086.319035][T27054] dump_stack_lvl+0x151/0x1b7 [ 2086.323549][T27054] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2086.328841][T27054] ? do_syscall_64+0x44/0xd0 [ 2086.333274][T27054] dump_stack+0x15/0x17 [ 2086.337257][T27054] should_fail+0x3c0/0x510 [ 2086.341513][T27054] __should_failslab+0x9f/0xe0 [ 2086.346113][T27054] should_failslab+0x9/0x20 [ 2086.350542][T27054] kmem_cache_alloc+0x4f/0x2f0 [ 2086.355225][T27054] ? anon_vma_clone+0xa1/0x4f0 [ 2086.359828][T27054] anon_vma_clone+0xa1/0x4f0 [ 2086.364251][T27054] anon_vma_fork+0x91/0x4f0 [ 2086.368589][T27054] ? anon_vma_name+0x4c/0x70 [ 2086.373020][T27054] dup_mmap+0x750/0xea0 [ 2086.377013][T27054] ? __delayed_free_task+0x20/0x20 [ 2086.381962][T27054] ? mm_init+0x807/0x960 [ 2086.386044][T27054] dup_mm+0x91/0x330 [ 2086.389769][T27054] copy_mm+0x108/0x1b0 [ 2086.393675][T27054] copy_process+0x1295/0x3250 [ 2086.398192][T27054] ? check_stack_object+0xf7/0x130 [ 2086.403139][T27054] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2086.408082][T27054] ? copy_clone_args_from_user+0x6cf/0x790 [ 2086.413725][T27054] kernel_clone+0x22d/0x990 [ 2086.418062][T27054] ? dup_mmap+0xea0/0xea0 [ 2086.422228][T27054] ? create_io_thread+0x1e0/0x1e0 [ 2086.427089][T27054] ? file_end_write+0x1b0/0x1b0 [ 2086.431779][T27054] __x64_sys_clone3+0x375/0x3a0 [ 2086.436464][T27054] ? __ia32_sys_clone+0x300/0x300 [ 2086.441327][T27054] ? ksys_write+0x25f/0x2c0 [ 2086.445665][T27054] ? debug_smp_processor_id+0x17/0x20 [ 2086.450961][T27054] do_syscall_64+0x44/0xd0 [ 2086.455213][T27054] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2086.460943][T27054] RIP: 0033:0x7f8f8bc980c9 [ 2086.465195][T27054] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2086.484638][T27054] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2086.492882][T27054] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2086.500695][T27054] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2086.508502][T27054] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 07:19:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x2800) [ 2086.516317][T27054] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2086.524125][T27054] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2086.531943][T27054] 07:19:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 18) 07:19:02 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 07:19:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x2988) 07:19:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x2a00) [ 2086.667263][T27072] FAULT_INJECTION: forcing a failure. [ 2086.667263][T27072] name failslab, interval 1, probability 0, space 0, times 0 [ 2086.691784][T27072] CPU: 0 PID: 27072 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2086.701864][T27072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2086.711754][T27072] Call Trace: [ 2086.714879][T27072] [ 2086.717670][T27072] dump_stack_lvl+0x151/0x1b7 [ 2086.722168][T27072] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2086.727463][T27072] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2086.733710][T27072] dump_stack+0x15/0x17 [ 2086.737704][T27072] should_fail+0x3c0/0x510 [ 2086.741959][T27072] __should_failslab+0x9f/0xe0 [ 2086.746556][T27072] should_failslab+0x9/0x20 [ 2086.750896][T27072] kmem_cache_alloc+0x4f/0x2f0 [ 2086.755494][T27072] ? anon_vma_fork+0xf7/0x4f0 [ 2086.760009][T27072] anon_vma_fork+0xf7/0x4f0 [ 2086.764348][T27072] ? anon_vma_name+0x4c/0x70 [ 2086.768787][T27072] dup_mmap+0x750/0xea0 [ 2086.772799][T27072] ? __delayed_free_task+0x20/0x20 [ 2086.777716][T27072] ? mm_init+0x807/0x960 [ 2086.781794][T27072] dup_mm+0x91/0x330 [ 2086.785526][T27072] copy_mm+0x108/0x1b0 [ 2086.789435][T27072] copy_process+0x1295/0x3250 [ 2086.793945][T27072] ? check_stack_object+0xf7/0x130 [ 2086.798894][T27072] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2086.803842][T27072] ? copy_clone_args_from_user+0x6cf/0x790 [ 2086.809484][T27072] kernel_clone+0x22d/0x990 [ 2086.813837][T27072] ? dup_mmap+0xea0/0xea0 [ 2086.817990][T27072] ? create_io_thread+0x1e0/0x1e0 [ 2086.822850][T27072] ? file_end_write+0x1b0/0x1b0 [ 2086.827535][T27072] __x64_sys_clone3+0x375/0x3a0 [ 2086.832222][T27072] ? __ia32_sys_clone+0x300/0x300 [ 2086.837085][T27072] ? ksys_write+0x25f/0x2c0 [ 2086.841421][T27072] ? debug_smp_processor_id+0x17/0x20 [ 2086.846633][T27072] do_syscall_64+0x44/0xd0 [ 2086.850883][T27072] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2086.856612][T27072] RIP: 0033:0x7f8f8bc980c9 [ 2086.860882][T27072] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2086.880304][T27072] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2086.888550][T27072] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2086.896364][T27072] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2086.904181][T27072] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 07:19:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x2c00) [ 2086.911984][T27072] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2086.919798][T27072] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2086.927612][T27072] 07:19:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x700000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 19) 07:19:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x2e00) 07:19:02 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x3000) [ 2087.120884][T27088] FAULT_INJECTION: forcing a failure. [ 2087.120884][T27088] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.172161][T27088] CPU: 1 PID: 27088 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2087.182241][T27088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2087.192129][T27088] Call Trace: [ 2087.195249][T27088] [ 2087.198030][T27088] dump_stack_lvl+0x151/0x1b7 [ 2087.202542][T27088] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2087.207841][T27088] dump_stack+0x15/0x17 [ 2087.211827][T27088] should_fail+0x3c0/0x510 [ 2087.216082][T27088] __should_failslab+0x9f/0xe0 [ 2087.220684][T27088] should_failslab+0x9/0x20 [ 2087.225022][T27088] kmem_cache_alloc+0x4f/0x2f0 [ 2087.229621][T27088] ? anon_vma_fork+0x1b9/0x4f0 [ 2087.234224][T27088] anon_vma_fork+0x1b9/0x4f0 [ 2087.238651][T27088] dup_mmap+0x750/0xea0 [ 2087.242643][T27088] ? __delayed_free_task+0x20/0x20 [ 2087.247589][T27088] ? mm_init+0x807/0x960 [ 2087.251668][T27088] dup_mm+0x91/0x330 [ 2087.255400][T27088] copy_mm+0x108/0x1b0 [ 2087.259306][T27088] copy_process+0x1295/0x3250 [ 2087.263821][T27088] ? check_stack_object+0xf7/0x130 [ 2087.268782][T27088] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2087.273712][T27088] ? copy_clone_args_from_user+0x6cf/0x790 [ 2087.279366][T27088] kernel_clone+0x22d/0x990 [ 2087.283705][T27088] ? dup_mmap+0xea0/0xea0 [ 2087.287862][T27088] ? create_io_thread+0x1e0/0x1e0 [ 2087.292732][T27088] ? file_end_write+0x1b0/0x1b0 [ 2087.297417][T27088] __x64_sys_clone3+0x375/0x3a0 [ 2087.302114][T27088] ? __ia32_sys_clone+0x300/0x300 [ 2087.306959][T27088] ? ksys_write+0x25f/0x2c0 [ 2087.311304][T27088] ? debug_smp_processor_id+0x17/0x20 [ 2087.316504][T27088] do_syscall_64+0x44/0xd0 [ 2087.320761][T27088] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2087.326492][T27088] RIP: 0033:0x7f8f8bc980c9 [ 2087.330744][T27088] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2087.350179][T27088] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2087.358424][T27088] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 07:19:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 20) 07:19:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xf0ff1f, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2087.366236][T27088] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2087.374049][T27088] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2087.381959][T27088] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2087.389768][T27088] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2087.397658][T27088] 07:19:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x3200) [ 2087.507511][T27105] FAULT_INJECTION: forcing a failure. [ 2087.507511][T27105] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2087.526724][T27105] CPU: 0 PID: 27105 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2087.536802][T27105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2087.546799][T27105] Call Trace: [ 2087.549918][T27105] [ 2087.552697][T27105] dump_stack_lvl+0x151/0x1b7 [ 2087.557208][T27105] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2087.562504][T27105] ? stack_trace_save+0x1f0/0x1f0 [ 2087.567367][T27105] ? __kernel_text_address+0x9a/0x110 [ 2087.572570][T27105] dump_stack+0x15/0x17 [ 2087.576564][T27105] should_fail+0x3c0/0x510 [ 2087.580827][T27105] should_fail_alloc_page+0x58/0x70 [ 2087.585852][T27105] __alloc_pages+0x1de/0x7c0 [ 2087.590281][T27105] ? stack_trace_save+0x12d/0x1f0 [ 2087.595226][T27105] ? stack_trace_snprint+0x100/0x100 [ 2087.600341][T27105] ? __count_vm_events+0x30/0x30 [ 2087.605122][T27105] ? __kasan_slab_alloc+0xc4/0xe0 [ 2087.609976][T27105] ? __kasan_slab_alloc+0xb2/0xe0 [ 2087.614840][T27105] ? kmem_cache_alloc+0x189/0x2f0 [ 2087.619692][T27105] ? anon_vma_fork+0x1b9/0x4f0 [ 2087.624294][T27105] get_zeroed_page+0x19/0x40 [ 2087.628723][T27105] __pud_alloc+0x8b/0x260 [ 2087.632889][T27105] ? do_handle_mm_fault+0x2370/0x2370 [ 2087.638097][T27105] ? __mmu_notifier_invalidate_range_start+0x656/0x6e0 [ 2087.644777][T27105] copy_page_range+0xd9e/0x1090 [ 2087.649468][T27105] ? pfn_valid+0x1e0/0x1e0 [ 2087.653741][T27105] dup_mmap+0x99f/0xea0 [ 2087.657719][T27105] ? __delayed_free_task+0x20/0x20 [ 2087.662657][T27105] ? mm_init+0x807/0x960 [ 2087.666738][T27105] dup_mm+0x91/0x330 [ 2087.670473][T27105] copy_mm+0x108/0x1b0 [ 2087.674377][T27105] copy_process+0x1295/0x3250 [ 2087.678890][T27105] ? check_stack_object+0xf7/0x130 [ 2087.683839][T27105] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2087.688784][T27105] ? copy_clone_args_from_user+0x6cf/0x790 [ 2087.694429][T27105] kernel_clone+0x22d/0x990 [ 2087.698764][T27105] ? dup_mmap+0xea0/0xea0 [ 2087.702932][T27105] ? create_io_thread+0x1e0/0x1e0 [ 2087.707792][T27105] ? file_end_write+0x1b0/0x1b0 [ 2087.712479][T27105] __x64_sys_clone3+0x375/0x3a0 [ 2087.717166][T27105] ? __ia32_sys_clone+0x300/0x300 [ 2087.722024][T27105] ? ksys_write+0x25f/0x2c0 [ 2087.726366][T27105] ? debug_smp_processor_id+0x17/0x20 [ 2087.731574][T27105] do_syscall_64+0x44/0xd0 [ 2087.735830][T27105] ? irqentry_exit+0x12/0x40 [ 2087.740253][T27105] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2087.745980][T27105] RIP: 0033:0x7f8f8bc980c9 [ 2087.750235][T27105] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2087.769765][T27105] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2087.778007][T27105] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2087.785821][T27105] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2087.793631][T27105] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2087.801443][T27105] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2087.809254][T27105] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2087.817069][T27105] 07:19:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x3400) 07:19:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x8829) 07:19:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 21) 07:19:03 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xe93}, 0x0) 07:19:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2087.947998][T27117] FAULT_INJECTION: forcing a failure. [ 2087.947998][T27117] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2087.963646][T27117] CPU: 0 PID: 27117 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2087.973697][T27117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2087.983594][T27117] Call Trace: [ 2087.986711][T27117] [ 2087.989489][T27117] dump_stack_lvl+0x151/0x1b7 [ 2087.994006][T27117] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2087.999295][T27117] ? __kasan_check_write+0x14/0x20 [ 2088.004243][T27117] ? __set_page_owner+0x2ee/0x310 [ 2088.009107][T27117] dump_stack+0x15/0x17 [ 2088.013096][T27117] should_fail+0x3c0/0x510 [ 2088.017353][T27117] should_fail_alloc_page+0x58/0x70 [ 2088.022383][T27117] __alloc_pages+0x1de/0x7c0 [ 2088.026810][T27117] ? __count_vm_events+0x30/0x30 [ 2088.031587][T27117] ? __count_vm_events+0x30/0x30 [ 2088.036358][T27117] ? __kasan_check_write+0x14/0x20 [ 2088.041305][T27117] ? _raw_spin_lock+0xa3/0x1b0 [ 2088.045904][T27117] __pmd_alloc+0xb1/0x550 [ 2088.050249][T27117] ? kmem_cache_alloc+0x189/0x2f0 [ 2088.055105][T27117] ? anon_vma_fork+0x1b9/0x4f0 [ 2088.059720][T27117] ? __pud_alloc+0x260/0x260 [ 2088.064132][T27117] ? __pud_alloc+0x218/0x260 [ 2088.068616][T27117] ? do_handle_mm_fault+0x2370/0x2370 [ 2088.073773][T27117] ? __mmu_notifier_invalidate_range_start+0x656/0x6e0 [ 2088.080451][T27117] copy_page_range+0xd04/0x1090 [ 2088.085151][T27117] ? pfn_valid+0x1e0/0x1e0 [ 2088.089389][T27117] dup_mmap+0x99f/0xea0 [ 2088.093384][T27117] ? __delayed_free_task+0x20/0x20 [ 2088.098331][T27117] ? mm_init+0x807/0x960 [ 2088.102415][T27117] dup_mm+0x91/0x330 [ 2088.106140][T27117] copy_mm+0x108/0x1b0 [ 2088.110048][T27117] copy_process+0x1295/0x3250 [ 2088.114561][T27117] ? check_stack_object+0xf7/0x130 [ 2088.119508][T27117] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2088.124456][T27117] ? copy_clone_args_from_user+0x6cf/0x790 [ 2088.130184][T27117] kernel_clone+0x22d/0x990 [ 2088.134532][T27117] ? dup_mmap+0xea0/0xea0 [ 2088.138689][T27117] ? create_io_thread+0x1e0/0x1e0 [ 2088.143548][T27117] ? file_end_write+0x1b0/0x1b0 [ 2088.148238][T27117] __x64_sys_clone3+0x375/0x3a0 [ 2088.152922][T27117] ? __ia32_sys_clone+0x300/0x300 [ 2088.157785][T27117] ? ksys_write+0x25f/0x2c0 [ 2088.162126][T27117] ? debug_smp_processor_id+0x17/0x20 [ 2088.167331][T27117] do_syscall_64+0x44/0xd0 [ 2088.171582][T27117] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2088.177315][T27117] RIP: 0033:0x7f8f8bc980c9 [ 2088.181570][T27117] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2088.201015][T27117] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2088.209256][T27117] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2088.217149][T27117] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2088.224960][T27117] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2088.232774][T27117] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2088.240593][T27117] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 07:19:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x3600) 07:19:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x2000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:03 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 22) [ 2088.248401][T27117] [ 2088.330667][T27134] FAULT_INJECTION: forcing a failure. [ 2088.330667][T27134] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.346577][T27134] CPU: 1 PID: 27134 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2088.356648][T27134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2088.366548][T27134] Call Trace: [ 2088.369673][T27134] [ 2088.372447][T27134] dump_stack_lvl+0x151/0x1b7 [ 2088.376960][T27134] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2088.382254][T27134] ? _raw_spin_lock+0xa3/0x1b0 [ 2088.386854][T27134] ? dup_fd+0x51f/0xa40 [ 2088.390850][T27134] dump_stack+0x15/0x17 [ 2088.394848][T27134] should_fail+0x3c0/0x510 [ 2088.399091][T27134] __should_failslab+0x9f/0xe0 [ 2088.403699][T27134] should_failslab+0x9/0x20 [ 2088.408033][T27134] kmem_cache_alloc+0x4f/0x2f0 [ 2088.412631][T27134] ? copy_fs_struct+0x4e/0x230 [ 2088.417235][T27134] copy_fs_struct+0x4e/0x230 [ 2088.421666][T27134] copy_fs+0x72/0x140 [ 2088.425736][T27134] copy_process+0x1214/0x3250 [ 2088.430259][T27134] ? check_stack_object+0xf7/0x130 [ 2088.435203][T27134] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2088.440146][T27134] ? copy_clone_args_from_user+0x6cf/0x790 [ 2088.445789][T27134] kernel_clone+0x22d/0x990 [ 2088.450130][T27134] ? dup_mmap+0xea0/0xea0 [ 2088.454293][T27134] ? create_io_thread+0x1e0/0x1e0 [ 2088.459153][T27134] ? file_end_write+0x1b0/0x1b0 [ 2088.463845][T27134] __x64_sys_clone3+0x375/0x3a0 [ 2088.468529][T27134] ? __ia32_sys_clone+0x300/0x300 [ 2088.473389][T27134] ? ksys_write+0x25f/0x2c0 [ 2088.477728][T27134] ? debug_smp_processor_id+0x17/0x20 [ 2088.482940][T27134] do_syscall_64+0x44/0xd0 [ 2088.487192][T27134] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2088.492917][T27134] RIP: 0033:0x7f8f8bc980c9 [ 2088.497169][T27134] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2088.516614][T27134] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x3800) 07:19:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x7000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 23) [ 2088.524859][T27134] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2088.532668][T27134] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2088.540477][T27134] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2088.548289][T27134] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2088.556101][T27134] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2088.563914][T27134] 07:19:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x4000) 07:19:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x38000) 07:19:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x8000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2088.688946][T27151] FAULT_INJECTION: forcing a failure. [ 2088.688946][T27151] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.702632][T27151] CPU: 1 PID: 27151 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2088.712718][T27151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2088.722606][T27151] Call Trace: [ 2088.725727][T27151] [ 2088.728506][T27151] dump_stack_lvl+0x151/0x1b7 [ 2088.733020][T27151] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2088.738329][T27151] dump_stack+0x15/0x17 [ 2088.742309][T27151] should_fail+0x3c0/0x510 [ 2088.746567][T27151] __should_failslab+0x9f/0xe0 [ 2088.751161][T27151] should_failslab+0x9/0x20 [ 2088.755501][T27151] kmem_cache_alloc+0x4f/0x2f0 [ 2088.760098][T27151] ? vm_area_dup+0x26/0x1d0 [ 2088.764439][T27151] vm_area_dup+0x26/0x1d0 [ 2088.768606][T27151] dup_mmap+0x6b8/0xea0 [ 2088.772598][T27151] ? __delayed_free_task+0x20/0x20 [ 2088.777546][T27151] ? mm_init+0x807/0x960 [ 2088.781625][T27151] dup_mm+0x91/0x330 [ 2088.785357][T27151] copy_mm+0x108/0x1b0 [ 2088.789264][T27151] copy_process+0x1295/0x3250 [ 2088.793785][T27151] ? check_stack_object+0xf7/0x130 [ 2088.798720][T27151] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2088.803670][T27151] ? copy_clone_args_from_user+0x6cf/0x790 [ 2088.809308][T27151] kernel_clone+0x22d/0x990 [ 2088.813649][T27151] ? dup_mmap+0xea0/0xea0 [ 2088.817814][T27151] ? create_io_thread+0x1e0/0x1e0 [ 2088.822679][T27151] ? file_end_write+0x1b0/0x1b0 [ 2088.827363][T27151] __x64_sys_clone3+0x375/0x3a0 [ 2088.832050][T27151] ? __ia32_sys_clone+0x300/0x300 [ 2088.836910][T27151] ? ksys_write+0x25f/0x2c0 [ 2088.841248][T27151] ? debug_smp_processor_id+0x17/0x20 [ 2088.846457][T27151] do_syscall_64+0x44/0xd0 [ 2088.850710][T27151] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2088.856444][T27151] RIP: 0033:0x7f8f8bc980c9 [ 2088.860692][T27151] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2088.880217][T27151] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2088.888464][T27151] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2088.896280][T27151] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2088.904087][T27151] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2088.911899][T27151] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2088.919709][T27151] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2088.927526][T27151] 07:19:04 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1900}, 0x0) 07:19:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x9000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 24) 07:19:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xc800) 07:19:04 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2089.061508][T27172] FAULT_INJECTION: forcing a failure. [ 2089.061508][T27172] name failslab, interval 1, probability 0, space 0, times 0 [ 2089.080824][T27172] CPU: 0 PID: 27172 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2089.090900][T27172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2089.100792][T27172] Call Trace: [ 2089.103915][T27172] [ 2089.106727][T27172] dump_stack_lvl+0x151/0x1b7 [ 2089.111207][T27172] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2089.116498][T27172] dump_stack+0x15/0x17 [ 2089.120489][T27172] should_fail+0x3c0/0x510 [ 2089.124743][T27172] __should_failslab+0x9f/0xe0 [ 2089.129347][T27172] should_failslab+0x9/0x20 [ 2089.133694][T27172] kmem_cache_alloc+0x4f/0x2f0 [ 2089.138286][T27172] ? vm_area_dup+0x26/0x1d0 [ 2089.142672][T27172] vm_area_dup+0x26/0x1d0 [ 2089.146794][T27172] dup_mmap+0x6b8/0xea0 [ 2089.150784][T27172] ? __delayed_free_task+0x20/0x20 [ 2089.155730][T27172] ? mm_init+0x807/0x960 [ 2089.159810][T27172] dup_mm+0x91/0x330 [ 2089.163543][T27172] copy_mm+0x108/0x1b0 [ 2089.167448][T27172] copy_process+0x1295/0x3250 [ 2089.171964][T27172] ? check_stack_object+0xf7/0x130 [ 2089.176909][T27172] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2089.181855][T27172] ? copy_clone_args_from_user+0x6cf/0x790 [ 2089.187501][T27172] kernel_clone+0x22d/0x990 [ 2089.191839][T27172] ? dup_mmap+0xea0/0xea0 [ 2089.196009][T27172] ? create_io_thread+0x1e0/0x1e0 [ 2089.200867][T27172] ? file_end_write+0x1b0/0x1b0 [ 2089.205551][T27172] __x64_sys_clone3+0x375/0x3a0 [ 2089.210242][T27172] ? __ia32_sys_clone+0x300/0x300 [ 2089.215100][T27172] ? ksys_write+0x25f/0x2c0 [ 2089.219446][T27172] ? debug_smp_processor_id+0x17/0x20 [ 2089.224662][T27172] do_syscall_64+0x44/0xd0 [ 2089.228898][T27172] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2089.234624][T27172] RIP: 0033:0x7f8f8bc980c9 [ 2089.238881][T27172] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 25) [ 2089.258324][T27172] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2089.266570][T27172] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2089.274375][T27172] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2089.282191][T27172] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2089.290006][T27172] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2089.297898][T27172] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2089.305725][T27172] 07:19:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x14ae02a0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:04 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xca00) [ 2089.397662][T27193] FAULT_INJECTION: forcing a failure. [ 2089.397662][T27193] name failslab, interval 1, probability 0, space 0, times 0 [ 2089.415436][T27193] CPU: 0 PID: 27193 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2089.425513][T27193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2089.435405][T27193] Call Trace: [ 2089.438529][T27193] [ 2089.441312][T27193] dump_stack_lvl+0x151/0x1b7 [ 2089.445826][T27193] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2089.451113][T27193] dump_stack+0x15/0x17 [ 2089.455109][T27193] should_fail+0x3c0/0x510 [ 2089.459361][T27193] __should_failslab+0x9f/0xe0 [ 2089.463962][T27193] should_failslab+0x9/0x20 [ 2089.468305][T27193] kmem_cache_alloc+0x4f/0x2f0 [ 2089.472902][T27193] ? vm_area_dup+0x26/0x1d0 [ 2089.477237][T27193] ? __kasan_check_read+0x11/0x20 [ 2089.482104][T27193] vm_area_dup+0x26/0x1d0 [ 2089.486268][T27193] dup_mmap+0x6b8/0xea0 [ 2089.490257][T27193] ? __delayed_free_task+0x20/0x20 [ 2089.495205][T27193] ? mm_init+0x807/0x960 [ 2089.499284][T27193] dup_mm+0x91/0x330 [ 2089.503021][T27193] copy_mm+0x108/0x1b0 [ 2089.506924][T27193] copy_process+0x1295/0x3250 [ 2089.511443][T27193] ? check_stack_object+0xf7/0x130 [ 2089.516388][T27193] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2089.521334][T27193] ? copy_clone_args_from_user+0x6cf/0x790 [ 2089.526971][T27193] kernel_clone+0x22d/0x990 [ 2089.531309][T27193] ? dup_mmap+0xea0/0xea0 [ 2089.535477][T27193] ? create_io_thread+0x1e0/0x1e0 [ 2089.540338][T27193] ? file_end_write+0x1b0/0x1b0 [ 2089.545025][T27193] __x64_sys_clone3+0x375/0x3a0 [ 2089.549774][T27193] ? __ia32_sys_clone+0x300/0x300 [ 2089.554572][T27193] ? ksys_write+0x25f/0x2c0 [ 2089.558920][T27193] ? debug_smp_processor_id+0x17/0x20 [ 2089.564124][T27193] do_syscall_64+0x44/0xd0 [ 2089.568373][T27193] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2089.574103][T27193] RIP: 0033:0x7f8f8bc980c9 [ 2089.578352][T27193] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2089.597794][T27193] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2089.606039][T27193] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2089.613850][T27193] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2089.621662][T27193] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2089.629472][T27193] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2089.637283][T27193] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2089.645104][T27193] 07:19:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x800300) 07:19:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xcc00) 07:19:05 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x930e}, 0x0) 07:19:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 26) 07:19:05 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x1f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x1ffff000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2089.932839][T27219] FAULT_INJECTION: forcing a failure. [ 2089.932839][T27219] name failslab, interval 1, probability 0, space 0, times 0 [ 2089.948767][T27219] CPU: 1 PID: 27219 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2089.958833][T27219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2089.968730][T27219] Call Trace: [ 2089.971849][T27219] [ 2089.974631][T27219] dump_stack_lvl+0x151/0x1b7 [ 2089.979143][T27219] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2089.984435][T27219] dump_stack+0x15/0x17 [ 2089.988427][T27219] should_fail+0x3c0/0x510 [ 2089.992680][T27219] __should_failslab+0x9f/0xe0 [ 2089.997279][T27219] should_failslab+0x9/0x20 [ 2090.001619][T27219] kmem_cache_alloc+0x4f/0x2f0 [ 2090.006219][T27219] ? dup_mm+0x29/0x330 [ 2090.010125][T27219] dup_mm+0x29/0x330 [ 2090.013857][T27219] copy_mm+0x108/0x1b0 [ 2090.017774][T27219] copy_process+0x1295/0x3250 [ 2090.022280][T27219] ? check_stack_object+0xf7/0x130 [ 2090.027227][T27219] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2090.032173][T27219] ? copy_clone_args_from_user+0x6cf/0x790 [ 2090.037823][T27219] kernel_clone+0x22d/0x990 [ 2090.042273][T27219] ? dup_mmap+0xea0/0xea0 [ 2090.046440][T27219] ? create_io_thread+0x1e0/0x1e0 [ 2090.051300][T27219] ? file_end_write+0x1b0/0x1b0 [ 2090.055988][T27219] __x64_sys_clone3+0x375/0x3a0 [ 2090.060676][T27219] ? __ia32_sys_clone+0x300/0x300 [ 2090.065539][T27219] ? ksys_write+0x25f/0x2c0 [ 2090.069973][T27219] ? debug_smp_processor_id+0x17/0x20 [ 2090.075180][T27219] do_syscall_64+0x44/0xd0 [ 2090.079430][T27219] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2090.085168][T27219] RIP: 0033:0x7f8f8bc980c9 [ 2090.089419][T27219] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2090.108855][T27219] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2090.117104][T27219] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2090.124909][T27219] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 07:19:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 27) 07:19:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xce00) [ 2090.132725][T27219] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2090.140537][T27219] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2090.148344][T27219] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2090.156160][T27219] [ 2090.264257][T27233] FAULT_INJECTION: forcing a failure. [ 2090.264257][T27233] name failslab, interval 1, probability 0, space 0, times 0 [ 2090.307613][T27233] CPU: 0 PID: 27233 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2090.317695][T27233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2090.327592][T27233] Call Trace: [ 2090.330714][T27233] [ 2090.333494][T27233] dump_stack_lvl+0x151/0x1b7 [ 2090.338008][T27233] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2090.343303][T27233] dump_stack+0x15/0x17 [ 2090.347289][T27233] should_fail+0x3c0/0x510 [ 2090.351548][T27233] __should_failslab+0x9f/0xe0 [ 2090.356149][T27233] should_failslab+0x9/0x20 [ 2090.360480][T27233] kmem_cache_alloc+0x4f/0x2f0 [ 2090.365082][T27233] ? anon_vma_clone+0xa1/0x4f0 [ 2090.369684][T27233] anon_vma_clone+0xa1/0x4f0 [ 2090.374112][T27233] anon_vma_fork+0x91/0x4f0 [ 2090.378449][T27233] ? anon_vma_name+0x4c/0x70 [ 2090.382879][T27233] dup_mmap+0x750/0xea0 [ 2090.386980][T27233] ? __delayed_free_task+0x20/0x20 [ 2090.391917][T27233] ? mm_init+0x807/0x960 [ 2090.396006][T27233] dup_mm+0x91/0x330 [ 2090.399736][T27233] copy_mm+0x108/0x1b0 [ 2090.403636][T27233] copy_process+0x1295/0x3250 [ 2090.408147][T27233] ? check_stack_object+0xf7/0x130 [ 2090.413097][T27233] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2090.418041][T27233] ? copy_clone_args_from_user+0x6cf/0x790 [ 2090.423687][T27233] kernel_clone+0x22d/0x990 [ 2090.428034][T27233] ? dup_mmap+0xea0/0xea0 [ 2090.432191][T27233] ? create_io_thread+0x1e0/0x1e0 [ 2090.437050][T27233] ? file_end_write+0x1b0/0x1b0 [ 2090.441823][T27233] __x64_sys_clone3+0x375/0x3a0 [ 2090.446510][T27233] ? __ia32_sys_clone+0x300/0x300 [ 2090.451373][T27233] ? ksys_write+0x25f/0x2c0 [ 2090.455713][T27233] ? debug_smp_processor_id+0x17/0x20 [ 2090.460917][T27233] do_syscall_64+0x44/0xd0 [ 2090.465169][T27233] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2090.470896][T27233] RIP: 0033:0x7f8f8bc980c9 [ 2090.475182][T27233] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2090.494600][T27233] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 28) 07:19:06 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xd000) [ 2090.502837][T27233] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2090.510648][T27233] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2090.518458][T27233] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2090.526271][T27233] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2090.534080][T27233] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2090.541900][T27233] 07:19:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x1000000) 07:19:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2090.643280][T27248] FAULT_INJECTION: forcing a failure. [ 2090.643280][T27248] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2090.673383][T27248] CPU: 1 PID: 27248 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2090.683457][T27248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2090.693354][T27248] Call Trace: [ 2090.696474][T27248] [ 2090.699253][T27248] dump_stack_lvl+0x151/0x1b7 [ 2090.703769][T27248] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2090.709061][T27248] ? pcpu_block_update_hint_alloc+0x972/0xd00 [ 2090.714964][T27248] dump_stack+0x15/0x17 [ 2090.718955][T27248] should_fail+0x3c0/0x510 [ 2090.723210][T27248] should_fail_alloc_page+0x58/0x70 [ 2090.728240][T27248] __alloc_pages+0x1de/0x7c0 [ 2090.732667][T27248] ? __count_vm_events+0x30/0x30 [ 2090.737442][T27248] __get_free_pages+0xe/0x30 [ 2090.741866][T27248] pgd_alloc+0x22/0x2c0 [ 2090.745858][T27248] mm_init+0x5bf/0x960 [ 2090.749764][T27248] dup_mm+0x7d/0x330 [ 2090.753498][T27248] copy_mm+0x108/0x1b0 [ 2090.757430][T27248] copy_process+0x1295/0x3250 [ 2090.761917][T27248] ? check_stack_object+0xf7/0x130 [ 2090.766866][T27248] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2090.771809][T27248] ? copy_clone_args_from_user+0x6cf/0x790 [ 2090.777451][T27248] kernel_clone+0x22d/0x990 [ 2090.781792][T27248] ? dup_mmap+0xea0/0xea0 [ 2090.785960][T27248] ? create_io_thread+0x1e0/0x1e0 [ 2090.790818][T27248] ? file_end_write+0x1b0/0x1b0 [ 2090.795505][T27248] __x64_sys_clone3+0x375/0x3a0 [ 2090.800193][T27248] ? __ia32_sys_clone+0x300/0x300 [ 2090.805057][T27248] ? ksys_write+0x25f/0x2c0 [ 2090.809404][T27248] ? debug_smp_processor_id+0x17/0x20 [ 2090.814601][T27248] do_syscall_64+0x44/0xd0 [ 2090.818854][T27248] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2090.824580][T27248] RIP: 0033:0x7f8f8bc980c9 [ 2090.828843][T27248] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2090.848274][T27248] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2090.856523][T27248] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2090.864330][T27248] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2090.872165][T27248] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2090.879954][T27248] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2090.887765][T27248] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2090.895582][T27248] 07:19:06 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x38000}, 0x0) 07:19:06 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 29) 07:19:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xa002ae14, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xf5ffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2091.045283][T27266] FAULT_INJECTION: forcing a failure. [ 2091.045283][T27266] name failslab, interval 1, probability 0, space 0, times 0 [ 2091.063817][T27266] CPU: 1 PID: 27266 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2091.073923][T27266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2091.083957][T27266] Call Trace: [ 2091.087079][T27266] [ 2091.089857][T27266] dump_stack_lvl+0x151/0x1b7 [ 2091.094371][T27266] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2091.099667][T27266] dump_stack+0x15/0x17 [ 2091.103652][T27266] should_fail+0x3c0/0x510 [ 2091.107910][T27266] __should_failslab+0x9f/0xe0 [ 2091.112510][T27266] should_failslab+0x9/0x20 [ 2091.116846][T27266] kmem_cache_alloc+0x4f/0x2f0 [ 2091.121448][T27266] ? vm_area_dup+0x26/0x1d0 [ 2091.125789][T27266] ? __kasan_check_read+0x11/0x20 [ 2091.130648][T27266] vm_area_dup+0x26/0x1d0 [ 2091.134817][T27266] dup_mmap+0x6b8/0xea0 [ 2091.138813][T27266] ? __delayed_free_task+0x20/0x20 [ 2091.143758][T27266] ? mm_init+0x807/0x960 [ 2091.147840][T27266] dup_mm+0x91/0x330 [ 2091.151572][T27266] copy_mm+0x108/0x1b0 [ 2091.155473][T27266] copy_process+0x1295/0x3250 [ 2091.159992][T27266] ? check_stack_object+0xf7/0x130 [ 2091.164938][T27266] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2091.169880][T27266] ? copy_clone_args_from_user+0x6cf/0x790 [ 2091.175646][T27266] kernel_clone+0x22d/0x990 [ 2091.179984][T27266] ? dup_mmap+0xea0/0xea0 [ 2091.184152][T27266] ? create_io_thread+0x1e0/0x1e0 [ 2091.189009][T27266] ? file_end_write+0x1b0/0x1b0 [ 2091.193694][T27266] __x64_sys_clone3+0x375/0x3a0 [ 2091.198381][T27266] ? __ia32_sys_clone+0x300/0x300 [ 2091.203342][T27266] ? ksys_write+0x25f/0x2c0 [ 2091.207695][T27266] ? debug_smp_processor_id+0x17/0x20 [ 2091.212970][T27266] do_syscall_64+0x44/0xd0 [ 2091.217225][T27266] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2091.222953][T27266] RIP: 0033:0x7f8f8bc980c9 [ 2091.227211][T27266] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2091.246652][T27266] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2091.254983][T27266] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2091.262789][T27266] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2091.270603][T27266] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2091.278415][T27266] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2091.286222][T27266] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 07:19:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 30) [ 2091.294040][T27266] 07:19:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xfbffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:06 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xd200) 07:19:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xff0f0100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2091.428149][T27278] FAULT_INJECTION: forcing a failure. [ 2091.428149][T27278] name failslab, interval 1, probability 0, space 0, times 0 [ 2091.465896][T27278] CPU: 1 PID: 27278 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2091.475989][T27278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2091.485876][T27278] Call Trace: [ 2091.488999][T27278] [ 2091.491780][T27278] dump_stack_lvl+0x151/0x1b7 [ 2091.496294][T27278] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2091.501587][T27278] ? do_syscall_64+0x44/0xd0 [ 2091.506015][T27278] dump_stack+0x15/0x17 [ 2091.510006][T27278] should_fail+0x3c0/0x510 [ 2091.514263][T27278] __should_failslab+0x9f/0xe0 [ 2091.518863][T27278] should_failslab+0x9/0x20 [ 2091.523198][T27278] kmem_cache_alloc+0x4f/0x2f0 [ 2091.527798][T27278] ? anon_vma_clone+0xa1/0x4f0 [ 2091.532397][T27278] anon_vma_clone+0xa1/0x4f0 [ 2091.536830][T27278] anon_vma_fork+0x91/0x4f0 [ 2091.541163][T27278] ? anon_vma_name+0x4c/0x70 [ 2091.545594][T27278] dup_mmap+0x750/0xea0 [ 2091.549588][T27278] ? __delayed_free_task+0x20/0x20 [ 2091.554532][T27278] ? mm_init+0x807/0x960 [ 2091.558610][T27278] dup_mm+0x91/0x330 [ 2091.562343][T27278] copy_mm+0x108/0x1b0 [ 2091.566246][T27278] copy_process+0x1295/0x3250 [ 2091.570765][T27278] ? check_stack_object+0xf7/0x130 [ 2091.575709][T27278] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2091.580655][T27278] ? copy_clone_args_from_user+0x6cf/0x790 [ 2091.586297][T27278] kernel_clone+0x22d/0x990 [ 2091.590641][T27278] ? dup_mmap+0xea0/0xea0 [ 2091.594805][T27278] ? create_io_thread+0x1e0/0x1e0 [ 2091.599668][T27278] ? file_end_write+0x1b0/0x1b0 [ 2091.604356][T27278] __x64_sys_clone3+0x375/0x3a0 [ 2091.609039][T27278] ? __ia32_sys_clone+0x300/0x300 [ 2091.613903][T27278] ? ksys_write+0x25f/0x2c0 [ 2091.618243][T27278] ? debug_smp_processor_id+0x17/0x20 [ 2091.623446][T27278] do_syscall_64+0x44/0xd0 [ 2091.627699][T27278] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2091.633426][T27278] RIP: 0033:0x7f8f8bc980c9 [ 2091.637683][T27278] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2091.657124][T27278] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2091.665366][T27278] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 07:19:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x2000000) 07:19:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 31) [ 2091.673178][T27278] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2091.680993][T27278] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2091.688802][T27278] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2091.696613][T27278] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2091.704430][T27278] 07:19:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xfffffff5, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:07 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x800300}, 0x0) [ 2091.811686][T27290] FAULT_INJECTION: forcing a failure. [ 2091.811686][T27290] name failslab, interval 1, probability 0, space 0, times 0 [ 2091.830119][T27290] CPU: 1 PID: 27290 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2091.840183][T27290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2091.850073][T27290] Call Trace: [ 2091.853199][T27290] [ 2091.855997][T27290] dump_stack_lvl+0x151/0x1b7 [ 2091.860486][T27290] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2091.865783][T27290] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2091.872030][T27290] dump_stack+0x15/0x17 [ 2091.876021][T27290] should_fail+0x3c0/0x510 [ 2091.880277][T27290] __should_failslab+0x9f/0xe0 [ 2091.884881][T27290] should_failslab+0x9/0x20 [ 2091.889217][T27290] kmem_cache_alloc+0x4f/0x2f0 [ 2091.893813][T27290] ? anon_vma_fork+0xf7/0x4f0 [ 2091.898336][T27290] anon_vma_fork+0xf7/0x4f0 [ 2091.902672][T27290] ? anon_vma_name+0x4c/0x70 [ 2091.907185][T27290] dup_mmap+0x750/0xea0 [ 2091.911181][T27290] ? __delayed_free_task+0x20/0x20 [ 2091.916126][T27290] ? mm_init+0x807/0x960 [ 2091.920204][T27290] dup_mm+0x91/0x330 [ 2091.923934][T27290] copy_mm+0x108/0x1b0 [ 2091.927843][T27290] copy_process+0x1295/0x3250 [ 2091.932358][T27290] ? check_stack_object+0xf7/0x130 [ 2091.937303][T27290] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2091.942272][T27290] ? copy_clone_args_from_user+0x6cf/0x790 [ 2091.947891][T27290] kernel_clone+0x22d/0x990 [ 2091.952229][T27290] ? dup_mmap+0xea0/0xea0 [ 2091.956396][T27290] ? create_io_thread+0x1e0/0x1e0 [ 2091.961258][T27290] ? file_end_write+0x1b0/0x1b0 [ 2091.965944][T27290] __x64_sys_clone3+0x375/0x3a0 [ 2091.970636][T27290] ? __ia32_sys_clone+0x300/0x300 [ 2091.975496][T27290] ? ksys_write+0x25f/0x2c0 [ 2091.979832][T27290] ? debug_smp_processor_id+0x17/0x20 [ 2091.985042][T27290] do_syscall_64+0x44/0xd0 [ 2091.989299][T27290] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2091.995019][T27290] RIP: 0033:0x7f8f8bc980c9 [ 2091.999275][T27290] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2092.018714][T27290] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2092.026960][T27290] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2092.034770][T27290] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2092.042582][T27290] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2092.050394][T27290] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 07:19:07 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 32) [ 2092.058207][T27290] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2092.066113][T27290] 07:19:07 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xd400) 07:19:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xfffffffb, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2092.148737][T27305] FAULT_INJECTION: forcing a failure. [ 2092.148737][T27305] name failslab, interval 1, probability 0, space 0, times 0 [ 2092.168355][T27305] CPU: 1 PID: 27305 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2092.178428][T27305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2092.188320][T27305] Call Trace: [ 2092.191446][T27305] [ 2092.194223][T27305] dump_stack_lvl+0x151/0x1b7 [ 2092.198741][T27305] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2092.204033][T27305] dump_stack+0x15/0x17 [ 2092.208031][T27305] should_fail+0x3c0/0x510 [ 2092.212291][T27305] __should_failslab+0x9f/0xe0 [ 2092.216875][T27305] should_failslab+0x9/0x20 [ 2092.221217][T27305] kmem_cache_alloc+0x4f/0x2f0 [ 2092.225818][T27305] ? anon_vma_fork+0x1b9/0x4f0 [ 2092.230428][T27305] anon_vma_fork+0x1b9/0x4f0 [ 2092.234854][T27305] dup_mmap+0x750/0xea0 [ 2092.238840][T27305] ? __delayed_free_task+0x20/0x20 [ 2092.243780][T27305] ? mm_init+0x807/0x960 [ 2092.247861][T27305] dup_mm+0x91/0x330 [ 2092.251593][T27305] copy_mm+0x108/0x1b0 [ 2092.255502][T27305] copy_process+0x1295/0x3250 [ 2092.260013][T27305] ? check_stack_object+0xf7/0x130 [ 2092.264960][T27305] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2092.269909][T27305] ? copy_clone_args_from_user+0x6cf/0x790 [ 2092.275552][T27305] kernel_clone+0x22d/0x990 [ 2092.279895][T27305] ? dup_mmap+0xea0/0xea0 [ 2092.284057][T27305] ? create_io_thread+0x1e0/0x1e0 [ 2092.288923][T27305] ? file_end_write+0x1b0/0x1b0 [ 2092.293605][T27305] __x64_sys_clone3+0x375/0x3a0 [ 2092.298288][T27305] ? __ia32_sys_clone+0x300/0x300 [ 2092.303152][T27305] ? ksys_write+0x25f/0x2c0 [ 2092.307493][T27305] ? debug_smp_processor_id+0x17/0x20 [ 2092.312698][T27305] do_syscall_64+0x44/0xd0 [ 2092.316950][T27305] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2092.322678][T27305] RIP: 0033:0x7f8f8bc980c9 [ 2092.326932][T27305] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 33) [ 2092.346464][T27305] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2092.354710][T27305] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2092.362523][T27305] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2092.370331][T27305] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2092.378142][T27305] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2092.385955][T27305] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2092.393767][T27305] 07:19:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x100000800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2092.484432][T27321] FAULT_INJECTION: forcing a failure. [ 2092.484432][T27321] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2092.497802][T27321] CPU: 0 PID: 27321 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2092.507864][T27321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2092.517759][T27321] Call Trace: [ 2092.520883][T27321] [ 2092.523657][T27321] dump_stack_lvl+0x151/0x1b7 [ 2092.528179][T27321] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2092.533469][T27321] dump_stack+0x15/0x17 [ 2092.537473][T27321] should_fail+0x3c0/0x510 [ 2092.541716][T27321] should_fail_alloc_page+0x58/0x70 [ 2092.546744][T27321] __alloc_pages+0x1de/0x7c0 [ 2092.551175][T27321] ? __count_vm_events+0x30/0x30 [ 2092.555949][T27321] ? dup_mm+0x91/0x330 [ 2092.559870][T27321] ? copy_mm+0x108/0x1b0 [ 2092.563931][T27321] ? copy_process+0x1295/0x3250 [ 2092.568617][T27321] ? kernel_clone+0x22d/0x990 [ 2092.573130][T27321] ? __x64_sys_clone3+0x375/0x3a0 [ 2092.577991][T27321] pte_alloc_one+0x73/0x1b0 [ 2092.582332][T27321] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2092.587365][T27321] ? __kasan_check_write+0x14/0x20 [ 2092.592311][T27321] ? __set_page_owner+0x2ee/0x310 [ 2092.597175][T27321] __pte_alloc+0x86/0x350 [ 2092.601338][T27321] ? post_alloc_hook+0x1ab/0x1b0 [ 2092.606110][T27321] ? free_pgtables+0x210/0x210 [ 2092.610713][T27321] ? get_page_from_freelist+0x38b/0x400 [ 2092.616269][T27321] copy_pte_range+0x1b1f/0x20b0 [ 2092.620958][T27321] ? __kunmap_atomic+0x80/0x80 [ 2092.625554][T27321] ? __pud_alloc+0x260/0x260 [ 2092.629988][T27321] ? __pud_alloc+0x218/0x260 [ 2092.634419][T27321] ? do_handle_mm_fault+0x2370/0x2370 [ 2092.639616][T27321] copy_page_range+0xc1e/0x1090 [ 2092.644305][T27321] ? pfn_valid+0x1e0/0x1e0 [ 2092.648558][T27321] dup_mmap+0x99f/0xea0 [ 2092.652549][T27321] ? __delayed_free_task+0x20/0x20 [ 2092.657499][T27321] ? mm_init+0x807/0x960 [ 2092.661580][T27321] dup_mm+0x91/0x330 [ 2092.665307][T27321] copy_mm+0x108/0x1b0 [ 2092.669221][T27321] copy_process+0x1295/0x3250 [ 2092.673731][T27321] ? check_stack_object+0xf7/0x130 [ 2092.678673][T27321] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2092.683621][T27321] ? copy_clone_args_from_user+0x6cf/0x790 [ 2092.689262][T27321] kernel_clone+0x22d/0x990 [ 2092.693599][T27321] ? dup_mmap+0xea0/0xea0 [ 2092.697771][T27321] ? create_io_thread+0x1e0/0x1e0 [ 2092.702627][T27321] ? file_end_write+0x1b0/0x1b0 [ 2092.707411][T27321] __x64_sys_clone3+0x375/0x3a0 [ 2092.712088][T27321] ? __ia32_sys_clone+0x300/0x300 [ 2092.716950][T27321] ? ksys_write+0x25f/0x2c0 [ 2092.721289][T27321] ? debug_smp_processor_id+0x17/0x20 [ 2092.726499][T27321] do_syscall_64+0x44/0xd0 [ 2092.730751][T27321] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2092.736501][T27321] RIP: 0033:0x7f8f8bc980c9 [ 2092.740730][T27321] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2092.760347][T27321] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2092.768590][T27321] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2092.776402][T27321] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 07:19:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x3000000) [ 2092.784214][T27321] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2092.792026][T27321] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2092.799836][T27321] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2092.807650][T27321] 07:19:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x1b0d41f000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 34) 07:19:08 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 07:19:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x2a8d608e3000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2092.909164][T27331] FAULT_INJECTION: forcing a failure. [ 2092.909164][T27331] name failslab, interval 1, probability 0, space 0, times 0 [ 2092.927935][T27331] CPU: 0 PID: 27331 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2092.938184][T27331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2092.948075][T27331] Call Trace: [ 2092.951202][T27331] [ 2092.953976][T27331] dump_stack_lvl+0x151/0x1b7 [ 2092.958491][T27331] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2092.963787][T27331] dump_stack+0x15/0x17 [ 2092.967778][T27331] should_fail+0x3c0/0x510 [ 2092.972030][T27331] __should_failslab+0x9f/0xe0 [ 2092.976630][T27331] should_failslab+0x9/0x20 [ 2092.980966][T27331] kmem_cache_alloc+0x4f/0x2f0 [ 2092.985566][T27331] ? vm_area_dup+0x26/0x1d0 [ 2092.989913][T27331] vm_area_dup+0x26/0x1d0 [ 2092.994073][T27331] dup_mmap+0x6b8/0xea0 [ 2092.998067][T27331] ? __delayed_free_task+0x20/0x20 [ 2093.003015][T27331] ? mm_init+0x807/0x960 [ 2093.007092][T27331] dup_mm+0x91/0x330 [ 2093.010826][T27331] copy_mm+0x108/0x1b0 [ 2093.014730][T27331] copy_process+0x1295/0x3250 [ 2093.019246][T27331] ? check_stack_object+0xf7/0x130 [ 2093.024189][T27331] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2093.029138][T27331] ? copy_clone_args_from_user+0x6cf/0x790 [ 2093.034781][T27331] kernel_clone+0x22d/0x990 [ 2093.039118][T27331] ? dup_mmap+0xea0/0xea0 [ 2093.043284][T27331] ? create_io_thread+0x1e0/0x1e0 [ 2093.048148][T27331] ? file_end_write+0x1b0/0x1b0 [ 2093.052832][T27331] __x64_sys_clone3+0x375/0x3a0 [ 2093.057518][T27331] ? __ia32_sys_clone+0x300/0x300 [ 2093.062386][T27331] ? ksys_write+0x25f/0x2c0 [ 2093.066723][T27331] ? debug_smp_processor_id+0x17/0x20 [ 2093.071928][T27331] do_syscall_64+0x44/0xd0 [ 2093.076177][T27331] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2093.081911][T27331] RIP: 0033:0x7f8f8bc980c9 [ 2093.086158][T27331] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 35) [ 2093.105604][T27331] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2093.113846][T27331] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2093.121654][T27331] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2093.129470][T27331] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2093.137277][T27331] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2093.145094][T27331] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2093.152908][T27331] [ 2093.234441][T27344] FAULT_INJECTION: forcing a failure. [ 2093.234441][T27344] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.246866][T27344] CPU: 1 PID: 27344 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2093.256907][T27344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2093.266813][T27344] Call Trace: [ 2093.269926][T27344] [ 2093.272707][T27344] dump_stack_lvl+0x151/0x1b7 [ 2093.277216][T27344] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2093.282514][T27344] dump_stack+0x15/0x17 [ 2093.286506][T27344] should_fail+0x3c0/0x510 [ 2093.290756][T27344] __should_failslab+0x9f/0xe0 [ 2093.295359][T27344] should_failslab+0x9/0x20 [ 2093.299695][T27344] kmem_cache_alloc+0x4f/0x2f0 [ 2093.304296][T27344] ? vm_area_dup+0x26/0x1d0 [ 2093.308634][T27344] ? __kasan_check_read+0x11/0x20 [ 2093.313500][T27344] vm_area_dup+0x26/0x1d0 [ 2093.317662][T27344] dup_mmap+0x6b8/0xea0 [ 2093.321654][T27344] ? __delayed_free_task+0x20/0x20 [ 2093.326604][T27344] ? mm_init+0x807/0x960 [ 2093.330682][T27344] dup_mm+0x91/0x330 [ 2093.334424][T27344] copy_mm+0x108/0x1b0 [ 2093.338323][T27344] copy_process+0x1295/0x3250 [ 2093.342838][T27344] ? check_stack_object+0xf7/0x130 [ 2093.347789][T27344] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2093.352735][T27344] ? copy_clone_args_from_user+0x6cf/0x790 [ 2093.358405][T27344] kernel_clone+0x22d/0x990 [ 2093.362829][T27344] ? dup_mmap+0xea0/0xea0 [ 2093.366989][T27344] ? create_io_thread+0x1e0/0x1e0 [ 2093.371849][T27344] ? file_end_write+0x1b0/0x1b0 [ 2093.376539][T27344] __x64_sys_clone3+0x375/0x3a0 [ 2093.381232][T27344] ? __ia32_sys_clone+0x300/0x300 [ 2093.386086][T27344] ? ksys_write+0x25f/0x2c0 [ 2093.390426][T27344] ? debug_smp_processor_id+0x17/0x20 [ 2093.395631][T27344] do_syscall_64+0x44/0xd0 [ 2093.399886][T27344] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2093.405613][T27344] RIP: 0033:0x7f8f8bc980c9 [ 2093.409867][T27344] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:09 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:09 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xd600) 07:19:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x553a27823000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2093.429313][T27344] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2093.437554][T27344] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2093.445395][T27344] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2093.453183][T27344] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2093.460989][T27344] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2093.468800][T27344] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2093.476620][T27344] 07:19:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x2001000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 36) [ 2093.567458][T27353] FAULT_INJECTION: forcing a failure. [ 2093.567458][T27353] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.580527][T27353] CPU: 0 PID: 27353 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2093.590591][T27353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2093.600481][T27353] Call Trace: [ 2093.603606][T27353] [ 2093.606390][T27353] dump_stack_lvl+0x151/0x1b7 [ 2093.610903][T27353] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2093.616390][T27353] ? do_syscall_64+0x44/0xd0 [ 2093.620802][T27353] dump_stack+0x15/0x17 [ 2093.624793][T27353] should_fail+0x3c0/0x510 [ 2093.629052][T27353] __should_failslab+0x9f/0xe0 [ 2093.633648][T27353] should_failslab+0x9/0x20 [ 2093.637989][T27353] kmem_cache_alloc+0x4f/0x2f0 [ 2093.642696][T27353] ? anon_vma_clone+0xa1/0x4f0 [ 2093.647414][T27353] anon_vma_clone+0xa1/0x4f0 [ 2093.651839][T27353] anon_vma_fork+0x91/0x4f0 [ 2093.656175][T27353] ? anon_vma_name+0x4c/0x70 [ 2093.660602][T27353] dup_mmap+0x750/0xea0 [ 2093.664594][T27353] ? __delayed_free_task+0x20/0x20 [ 2093.669540][T27353] ? mm_init+0x807/0x960 [ 2093.673618][T27353] dup_mm+0x91/0x330 [ 2093.677351][T27353] copy_mm+0x108/0x1b0 [ 2093.681259][T27353] copy_process+0x1295/0x3250 [ 2093.685776][T27353] ? check_stack_object+0xf7/0x130 [ 2093.690716][T27353] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2093.695665][T27353] ? copy_clone_args_from_user+0x6cf/0x790 [ 2093.701307][T27353] kernel_clone+0x22d/0x990 [ 2093.705645][T27353] ? dup_mmap+0xea0/0xea0 [ 2093.709812][T27353] ? create_io_thread+0x1e0/0x1e0 [ 2093.714670][T27353] ? file_end_write+0x1b0/0x1b0 [ 2093.719359][T27353] __x64_sys_clone3+0x375/0x3a0 [ 2093.724046][T27353] ? __ia32_sys_clone+0x300/0x300 [ 2093.728906][T27353] ? ksys_write+0x25f/0x2c0 [ 2093.733249][T27353] ? debug_smp_processor_id+0x17/0x20 [ 2093.738463][T27353] do_syscall_64+0x44/0xd0 [ 2093.742707][T27353] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2093.748433][T27353] RIP: 0033:0x7f8f8bc980c9 [ 2093.752690][T27353] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2093.772129][T27353] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2093.780374][T27353] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2093.788186][T27353] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2093.795995][T27353] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2093.803810][T27353] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 07:19:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x4000000) 07:19:09 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xd800) 07:19:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x2020000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:09 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 2093.811620][T27353] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2093.819442][T27353] 07:19:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 37) 07:19:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x8000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2093.907702][T27374] FAULT_INJECTION: forcing a failure. [ 2093.907702][T27374] name failslab, interval 1, probability 0, space 0, times 0 [ 2093.920781][T27374] CPU: 0 PID: 27374 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2093.930846][T27374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2093.940748][T27374] Call Trace: [ 2093.943865][T27374] [ 2093.946641][T27374] dump_stack_lvl+0x151/0x1b7 [ 2093.951162][T27374] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2093.956453][T27374] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2093.962703][T27374] dump_stack+0x15/0x17 [ 2093.966691][T27374] should_fail+0x3c0/0x510 [ 2093.970944][T27374] __should_failslab+0x9f/0xe0 [ 2093.975546][T27374] should_failslab+0x9/0x20 [ 2093.979887][T27374] kmem_cache_alloc+0x4f/0x2f0 [ 2093.984483][T27374] ? anon_vma_fork+0xf7/0x4f0 [ 2093.988998][T27374] anon_vma_fork+0xf7/0x4f0 [ 2093.993344][T27374] ? anon_vma_name+0x4c/0x70 [ 2093.997768][T27374] dup_mmap+0x750/0xea0 [ 2094.001757][T27374] ? __delayed_free_task+0x20/0x20 [ 2094.006704][T27374] ? mm_init+0x807/0x960 [ 2094.010785][T27374] dup_mm+0x91/0x330 [ 2094.014517][T27374] copy_mm+0x108/0x1b0 [ 2094.018426][T27374] copy_process+0x1295/0x3250 [ 2094.022939][T27374] ? check_stack_object+0xf7/0x130 [ 2094.027884][T27374] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2094.032833][T27374] ? copy_clone_args_from_user+0x6cf/0x790 [ 2094.038471][T27374] kernel_clone+0x22d/0x990 [ 2094.042817][T27374] ? dup_mmap+0xea0/0xea0 [ 2094.046974][T27374] ? create_io_thread+0x1e0/0x1e0 [ 2094.051836][T27374] ? file_end_write+0x1b0/0x1b0 [ 2094.056522][T27374] __x64_sys_clone3+0x375/0x3a0 [ 2094.061209][T27374] ? __ia32_sys_clone+0x300/0x300 [ 2094.066073][T27374] ? ksys_write+0x25f/0x2c0 [ 2094.070417][T27374] ? debug_smp_processor_id+0x17/0x20 [ 2094.075620][T27374] do_syscall_64+0x44/0xd0 [ 2094.079871][T27374] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2094.085600][T27374] RIP: 0033:0x7f8f8bc980c9 [ 2094.089854][T27374] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2094.109310][T27374] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2094.117543][T27374] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2094.125353][T27374] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2094.133167][T27374] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2094.140971][T27374] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2094.148791][T27374] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 07:19:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 38) [ 2094.156684][T27374] 07:19:09 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x8000001000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:09 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xda00) [ 2094.231363][T27390] FAULT_INJECTION: forcing a failure. [ 2094.231363][T27390] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.243959][T27390] CPU: 0 PID: 27390 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2094.254032][T27390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2094.263914][T27390] Call Trace: [ 2094.267044][T27390] [ 2094.269816][T27390] dump_stack_lvl+0x151/0x1b7 [ 2094.274334][T27390] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2094.279625][T27390] dump_stack+0x15/0x17 [ 2094.283616][T27390] should_fail+0x3c0/0x510 [ 2094.287876][T27390] __should_failslab+0x9f/0xe0 [ 2094.292591][T27390] should_failslab+0x9/0x20 [ 2094.296908][T27390] kmem_cache_alloc+0x4f/0x2f0 [ 2094.301506][T27390] ? anon_vma_fork+0x1b9/0x4f0 [ 2094.306109][T27390] anon_vma_fork+0x1b9/0x4f0 [ 2094.310531][T27390] dup_mmap+0x750/0xea0 [ 2094.314530][T27390] ? __delayed_free_task+0x20/0x20 [ 2094.319474][T27390] ? mm_init+0x807/0x960 [ 2094.323554][T27390] dup_mm+0x91/0x330 [ 2094.327282][T27390] copy_mm+0x108/0x1b0 [ 2094.331191][T27390] copy_process+0x1295/0x3250 [ 2094.335703][T27390] ? check_stack_object+0xf7/0x130 [ 2094.340656][T27390] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2094.345596][T27390] ? copy_clone_args_from_user+0x6cf/0x790 [ 2094.351237][T27390] kernel_clone+0x22d/0x990 [ 2094.355579][T27390] ? dup_mmap+0xea0/0xea0 [ 2094.359745][T27390] ? create_io_thread+0x1e0/0x1e0 [ 2094.364605][T27390] ? file_end_write+0x1b0/0x1b0 [ 2094.369333][T27390] __x64_sys_clone3+0x375/0x3a0 [ 2094.373982][T27390] ? __ia32_sys_clone+0x300/0x300 [ 2094.378844][T27390] ? ksys_write+0x25f/0x2c0 [ 2094.383183][T27390] ? debug_smp_processor_id+0x17/0x20 [ 2094.388388][T27390] do_syscall_64+0x44/0xd0 [ 2094.392639][T27390] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2094.398585][T27390] RIP: 0033:0x7f8f8bc980c9 [ 2094.402819][T27390] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2094.422256][T27390] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:10 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xdc00) 07:19:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 39) [ 2094.430499][T27390] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2094.438310][T27390] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2094.446130][T27390] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2094.453936][T27390] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2094.461758][T27390] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2094.469562][T27390] [ 2094.557746][T27400] FAULT_INJECTION: forcing a failure. [ 2094.557746][T27400] name failslab, interval 1, probability 0, space 0, times 0 [ 2094.570991][T27400] CPU: 0 PID: 27400 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2094.581184][T27400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2094.591086][T27400] Call Trace: [ 2094.594213][T27400] [ 2094.596980][T27400] dump_stack_lvl+0x151/0x1b7 [ 2094.601504][T27400] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2094.606933][T27400] ? do_syscall_64+0x44/0xd0 [ 2094.611351][T27400] dump_stack+0x15/0x17 [ 2094.615341][T27400] should_fail+0x3c0/0x510 [ 2094.619591][T27400] __should_failslab+0x9f/0xe0 [ 2094.624195][T27400] should_failslab+0x9/0x20 [ 2094.628527][T27400] kmem_cache_alloc+0x4f/0x2f0 [ 2094.633125][T27400] ? anon_vma_clone+0xa1/0x4f0 [ 2094.637728][T27400] anon_vma_clone+0xa1/0x4f0 [ 2094.642285][T27400] anon_vma_fork+0x91/0x4f0 [ 2094.646606][T27400] ? anon_vma_name+0x4c/0x70 [ 2094.651007][T27400] dup_mmap+0x750/0xea0 07:19:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x5000000) 07:19:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x10100000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2094.655003][T27400] ? __delayed_free_task+0x20/0x20 [ 2094.660036][T27400] ? mm_init+0x807/0x960 [ 2094.664111][T27400] dup_mm+0x91/0x330 [ 2094.667848][T27400] copy_mm+0x108/0x1b0 [ 2094.671754][T27400] copy_process+0x1295/0x3250 [ 2094.676268][T27400] ? check_stack_object+0xf7/0x130 [ 2094.681212][T27400] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2094.686161][T27400] ? copy_clone_args_from_user+0x6cf/0x790 [ 2094.691803][T27400] kernel_clone+0x22d/0x990 [ 2094.696144][T27400] ? dup_mmap+0xea0/0xea0 [ 2094.700307][T27400] ? create_io_thread+0x1e0/0x1e0 [ 2094.705164][T27400] ? file_end_write+0x1b0/0x1b0 [ 2094.709939][T27400] __x64_sys_clone3+0x375/0x3a0 [ 2094.714630][T27400] ? __ia32_sys_clone+0x300/0x300 [ 2094.719491][T27400] ? ksys_write+0x25f/0x2c0 [ 2094.723914][T27400] ? debug_smp_processor_id+0x17/0x20 [ 2094.729128][T27400] do_syscall_64+0x44/0xd0 [ 2094.733378][T27400] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2094.739100][T27400] RIP: 0033:0x7f8f8bc980c9 [ 2094.743356][T27400] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2094.762799][T27400] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2094.771302][T27400] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2094.779112][T27400] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2094.786938][T27400] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2094.794734][T27400] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 07:19:10 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 07:19:10 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:10 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xde00) 07:19:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 40) [ 2094.802555][T27400] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2094.810457][T27400] 07:19:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x3082273a550000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2094.913461][T27423] FAULT_INJECTION: forcing a failure. [ 2094.913461][T27423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2094.948004][T27423] CPU: 1 PID: 27423 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2094.958080][T27423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2094.967974][T27423] Call Trace: [ 2094.971093][T27423] [ 2094.973872][T27423] dump_stack_lvl+0x151/0x1b7 [ 2094.978471][T27423] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2094.983770][T27423] ? __kasan_check_write+0x14/0x20 [ 2094.988713][T27423] ? __set_page_owner+0x2ee/0x310 [ 2094.993572][T27423] dump_stack+0x15/0x17 [ 2094.997568][T27423] should_fail+0x3c0/0x510 [ 2095.001818][T27423] should_fail_alloc_page+0x58/0x70 [ 2095.007026][T27423] __alloc_pages+0x1de/0x7c0 [ 2095.011462][T27423] ? __count_vm_events+0x30/0x30 [ 2095.016229][T27423] ? __count_vm_events+0x30/0x30 [ 2095.021000][T27423] ? __kasan_check_write+0x14/0x20 [ 2095.026066][T27423] ? _raw_spin_lock+0xa3/0x1b0 [ 2095.030664][T27423] __pmd_alloc+0xb1/0x550 [ 2095.034831][T27423] ? kmem_cache_alloc+0x189/0x2f0 [ 2095.039689][T27423] ? anon_vma_fork+0x1b9/0x4f0 [ 2095.044292][T27423] ? __pud_alloc+0x260/0x260 [ 2095.048717][T27423] ? __pud_alloc+0x218/0x260 [ 2095.053145][T27423] ? do_handle_mm_fault+0x2370/0x2370 [ 2095.058359][T27423] ? __mmu_notifier_invalidate_range_start+0x656/0x6e0 [ 2095.065039][T27423] copy_page_range+0xd04/0x1090 [ 2095.069728][T27423] ? pfn_valid+0x1e0/0x1e0 [ 2095.073977][T27423] dup_mmap+0x99f/0xea0 [ 2095.077969][T27423] ? __delayed_free_task+0x20/0x20 [ 2095.082923][T27423] ? mm_init+0x807/0x960 [ 2095.087018][T27423] dup_mm+0x91/0x330 [ 2095.090725][T27423] copy_mm+0x108/0x1b0 [ 2095.094633][T27423] copy_process+0x1295/0x3250 [ 2095.099147][T27423] ? check_stack_object+0xf7/0x130 [ 2095.104095][T27423] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2095.109039][T27423] ? copy_clone_args_from_user+0x6cf/0x790 [ 2095.114682][T27423] kernel_clone+0x22d/0x990 [ 2095.119020][T27423] ? dup_mmap+0xea0/0xea0 [ 2095.123187][T27423] ? create_io_thread+0x1e0/0x1e0 [ 2095.128048][T27423] ? file_end_write+0x1b0/0x1b0 [ 2095.132737][T27423] __x64_sys_clone3+0x375/0x3a0 [ 2095.137423][T27423] ? __ia32_sys_clone+0x300/0x300 [ 2095.142282][T27423] ? ksys_write+0x25f/0x2c0 [ 2095.146628][T27423] ? debug_smp_processor_id+0x17/0x20 [ 2095.151833][T27423] do_syscall_64+0x44/0xd0 [ 2095.156085][T27423] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2095.161808][T27423] RIP: 0033:0x7f8f8bc980c9 [ 2095.166070][T27423] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2095.185593][T27423] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2095.193840][T27423] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2095.201649][T27423] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 07:19:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 41) 07:19:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x308e608d2a0000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2095.209462][T27423] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2095.217274][T27423] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2095.225083][T27423] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2095.232902][T27423] 07:19:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x70000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2095.369401][T27436] FAULT_INJECTION: forcing a failure. [ 2095.369401][T27436] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2095.395523][T27436] CPU: 1 PID: 27436 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2095.405595][T27436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2095.415492][T27436] Call Trace: [ 2095.418611][T27436] [ 2095.421390][T27436] dump_stack_lvl+0x151/0x1b7 [ 2095.425901][T27436] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2095.431198][T27436] dump_stack+0x15/0x17 [ 2095.435186][T27436] should_fail+0x3c0/0x510 [ 2095.439449][T27436] should_fail_alloc_page+0x58/0x70 [ 2095.444473][T27436] __alloc_pages+0x1de/0x7c0 [ 2095.448902][T27436] ? __count_vm_events+0x30/0x30 [ 2095.453677][T27436] ? dup_mm+0x91/0x330 [ 2095.457577][T27436] ? copy_mm+0x108/0x1b0 [ 2095.461658][T27436] ? copy_process+0x1295/0x3250 [ 2095.466344][T27436] ? kernel_clone+0x22d/0x990 [ 2095.470857][T27436] ? __x64_sys_clone3+0x375/0x3a0 [ 2095.475718][T27436] pte_alloc_one+0x73/0x1b0 [ 2095.480057][T27436] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2095.485092][T27436] ? __kasan_check_write+0x14/0x20 [ 2095.490040][T27436] ? __set_page_owner+0x2ee/0x310 [ 2095.494901][T27436] __pte_alloc+0x86/0x350 [ 2095.499067][T27436] ? post_alloc_hook+0x1ab/0x1b0 [ 2095.503838][T27436] ? free_pgtables+0x210/0x210 [ 2095.508440][T27436] ? get_page_from_freelist+0x38b/0x400 [ 2095.513822][T27436] copy_pte_range+0x1b1f/0x20b0 [ 2095.518512][T27436] ? __kunmap_atomic+0x80/0x80 [ 2095.523129][T27436] ? __pud_alloc+0x260/0x260 [ 2095.527533][T27436] ? __pud_alloc+0x218/0x260 [ 2095.531961][T27436] ? do_handle_mm_fault+0x2370/0x2370 [ 2095.537170][T27436] copy_page_range+0xc1e/0x1090 [ 2095.541860][T27436] ? pfn_valid+0x1e0/0x1e0 [ 2095.546110][T27436] dup_mmap+0x99f/0xea0 [ 2095.550101][T27436] ? __delayed_free_task+0x20/0x20 [ 2095.555049][T27436] ? mm_init+0x807/0x960 [ 2095.559126][T27436] dup_mm+0x91/0x330 [ 2095.562859][T27436] copy_mm+0x108/0x1b0 [ 2095.566766][T27436] copy_process+0x1295/0x3250 [ 2095.571280][T27436] ? check_stack_object+0xf7/0x130 [ 2095.576227][T27436] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2095.581172][T27436] ? copy_clone_args_from_user+0x6cf/0x790 [ 2095.586821][T27436] kernel_clone+0x22d/0x990 [ 2095.591153][T27436] ? dup_mmap+0xea0/0xea0 [ 2095.595324][T27436] ? create_io_thread+0x1e0/0x1e0 [ 2095.600184][T27436] ? file_end_write+0x1b0/0x1b0 [ 2095.604868][T27436] __x64_sys_clone3+0x375/0x3a0 [ 2095.609554][T27436] ? __ia32_sys_clone+0x300/0x300 [ 2095.614416][T27436] ? ksys_write+0x25f/0x2c0 [ 2095.618756][T27436] ? debug_smp_processor_id+0x17/0x20 [ 2095.623964][T27436] do_syscall_64+0x44/0xd0 [ 2095.628217][T27436] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2095.633946][T27436] RIP: 0033:0x7f8f8bc980c9 [ 2095.638201][T27436] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2095.657639][T27436] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x6000000) 07:19:11 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xe000) [ 2095.665883][T27436] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2095.673697][T27436] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2095.681508][T27436] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2095.689317][T27436] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2095.697128][T27436] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2095.704944][T27436] 07:19:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 42) 07:19:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:11 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 07:19:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xf0410d1b000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2095.817503][T27446] FAULT_INJECTION: forcing a failure. [ 2095.817503][T27446] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.832778][T27446] CPU: 0 PID: 27446 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2095.842848][T27446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2095.852750][T27446] Call Trace: [ 2095.855873][T27446] [ 2095.858647][T27446] dump_stack_lvl+0x151/0x1b7 [ 2095.863161][T27446] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2095.868457][T27446] dump_stack+0x15/0x17 [ 2095.872447][T27446] should_fail+0x3c0/0x510 [ 2095.876697][T27446] __should_failslab+0x9f/0xe0 [ 2095.881298][T27446] should_failslab+0x9/0x20 [ 2095.885641][T27446] kmem_cache_alloc+0x4f/0x2f0 [ 2095.890239][T27446] ? anon_vma_clone+0xa1/0x4f0 [ 2095.894844][T27446] anon_vma_clone+0xa1/0x4f0 [ 2095.899269][T27446] anon_vma_fork+0x91/0x4f0 [ 2095.903604][T27446] ? anon_vma_name+0x4c/0x70 [ 2095.908031][T27446] dup_mmap+0x750/0xea0 [ 2095.912022][T27446] ? __delayed_free_task+0x20/0x20 [ 2095.916976][T27446] ? mm_init+0x807/0x960 [ 2095.921048][T27446] dup_mm+0x91/0x330 [ 2095.924781][T27446] copy_mm+0x108/0x1b0 [ 2095.928687][T27446] copy_process+0x1295/0x3250 [ 2095.933206][T27446] ? check_stack_object+0xf7/0x130 [ 2095.938152][T27446] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2095.943098][T27446] ? copy_clone_args_from_user+0x6cf/0x790 [ 2095.948842][T27446] kernel_clone+0x22d/0x990 [ 2095.953180][T27446] ? dup_mmap+0xea0/0xea0 [ 2095.957346][T27446] ? create_io_thread+0x1e0/0x1e0 [ 2095.962208][T27446] ? file_end_write+0x1b0/0x1b0 [ 2095.966894][T27446] __x64_sys_clone3+0x375/0x3a0 [ 2095.971600][T27446] ? __ia32_sys_clone+0x300/0x300 [ 2095.976440][T27446] ? ksys_write+0x25f/0x2c0 [ 2095.980779][T27446] ? debug_smp_processor_id+0x17/0x20 [ 2095.985990][T27446] do_syscall_64+0x44/0xd0 [ 2095.990243][T27446] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2095.995973][T27446] RIP: 0033:0x7f8f8bc980c9 [ 2096.000224][T27446] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2096.019662][T27446] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2096.027914][T27446] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2096.035724][T27446] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2096.043527][T27446] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2096.051343][T27446] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2096.059156][T27446] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2096.066967][T27446] 07:19:11 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xe200) 07:19:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 43) 07:19:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xf0ff1f00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2096.229255][T27466] FAULT_INJECTION: forcing a failure. [ 2096.229255][T27466] name failslab, interval 1, probability 0, space 0, times 0 [ 2096.242334][T27466] CPU: 1 PID: 27466 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2096.252395][T27466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2096.262289][T27466] Call Trace: [ 2096.265410][T27466] [ 2096.268189][T27466] dump_stack_lvl+0x151/0x1b7 [ 2096.272705][T27466] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2096.277999][T27466] dump_stack+0x15/0x17 [ 2096.281989][T27466] should_fail+0x3c0/0x510 [ 2096.286247][T27466] __should_failslab+0x9f/0xe0 [ 2096.290843][T27466] should_failslab+0x9/0x20 [ 2096.295181][T27466] kmem_cache_alloc+0x4f/0x2f0 [ 2096.299785][T27466] ? anon_vma_fork+0x1b9/0x4f0 [ 2096.304383][T27466] anon_vma_fork+0x1b9/0x4f0 [ 2096.308810][T27466] dup_mmap+0x750/0xea0 [ 2096.312806][T27466] ? __delayed_free_task+0x20/0x20 [ 2096.317755][T27466] ? mm_init+0x807/0x960 [ 2096.321830][T27466] dup_mm+0x91/0x330 [ 2096.325560][T27466] copy_mm+0x108/0x1b0 [ 2096.329466][T27466] copy_process+0x1295/0x3250 [ 2096.333988][T27466] ? check_stack_object+0xf7/0x130 [ 2096.338935][T27466] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2096.343875][T27466] ? copy_clone_args_from_user+0x6cf/0x790 [ 2096.349518][T27466] kernel_clone+0x22d/0x990 [ 2096.353860][T27466] ? dup_mmap+0xea0/0xea0 [ 2096.358022][T27466] ? create_io_thread+0x1e0/0x1e0 [ 2096.362899][T27466] ? file_end_write+0x1b0/0x1b0 [ 2096.367572][T27466] __x64_sys_clone3+0x375/0x3a0 [ 2096.372255][T27466] ? __ia32_sys_clone+0x300/0x300 [ 2096.377119][T27466] ? ksys_write+0x25f/0x2c0 [ 2096.381457][T27466] ? debug_smp_processor_id+0x17/0x20 [ 2096.386664][T27466] do_syscall_64+0x44/0xd0 [ 2096.390915][T27466] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2096.396753][T27466] RIP: 0033:0x7f8f8bc980c9 [ 2096.401005][T27466] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2096.420448][T27466] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 44) [ 2096.428692][T27466] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2096.436614][T27466] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2096.444426][T27466] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2096.452235][T27466] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2096.460049][T27466] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2096.467866][T27466] 07:19:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x7000000) 07:19:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x200000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2096.608227][T27481] FAULT_INJECTION: forcing a failure. [ 2096.608227][T27481] name failslab, interval 1, probability 0, space 0, times 0 [ 2096.624370][T27481] CPU: 1 PID: 27481 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2096.634440][T27481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2096.644336][T27481] Call Trace: [ 2096.647455][T27481] [ 2096.650235][T27481] dump_stack_lvl+0x151/0x1b7 [ 2096.654746][T27481] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2096.660128][T27481] dump_stack+0x15/0x17 [ 2096.664119][T27481] should_fail+0x3c0/0x510 [ 2096.668378][T27481] __should_failslab+0x9f/0xe0 [ 2096.672974][T27481] should_failslab+0x9/0x20 [ 2096.677314][T27481] kmem_cache_alloc+0x4f/0x2f0 [ 2096.681914][T27481] ? anon_vma_fork+0x1b9/0x4f0 [ 2096.686514][T27481] anon_vma_fork+0x1b9/0x4f0 [ 2096.690941][T27481] dup_mmap+0x750/0xea0 [ 2096.694937][T27481] ? __delayed_free_task+0x20/0x20 [ 2096.699882][T27481] ? mm_init+0x807/0x960 [ 2096.703963][T27481] dup_mm+0x91/0x330 [ 2096.707694][T27481] copy_mm+0x108/0x1b0 [ 2096.711596][T27481] copy_process+0x1295/0x3250 [ 2096.716113][T27481] ? check_stack_object+0xf7/0x130 [ 2096.721063][T27481] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2096.726004][T27481] ? copy_clone_args_from_user+0x6cf/0x790 [ 2096.731649][T27481] kernel_clone+0x22d/0x990 [ 2096.735987][T27481] ? dup_mmap+0xea0/0xea0 [ 2096.740159][T27481] ? create_io_thread+0x1e0/0x1e0 [ 2096.745013][T27481] ? file_end_write+0x1b0/0x1b0 [ 2096.749698][T27481] __x64_sys_clone3+0x375/0x3a0 [ 2096.754387][T27481] ? __ia32_sys_clone+0x300/0x300 [ 2096.759246][T27481] ? ksys_write+0x25f/0x2c0 [ 2096.763583][T27481] ? debug_smp_processor_id+0x17/0x20 [ 2096.768792][T27481] do_syscall_64+0x44/0xd0 [ 2096.773047][T27481] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2096.778772][T27481] RIP: 0033:0x7f8f8bc980c9 [ 2096.783027][T27481] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x700000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 45) [ 2096.802586][T27481] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2096.810824][T27481] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2096.818634][T27481] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2096.826445][T27481] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2096.834258][T27481] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2096.842071][T27481] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2096.849977][T27481] 07:19:12 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:12 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 07:19:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x800000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:12 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xe400) [ 2096.940130][T27490] FAULT_INJECTION: forcing a failure. [ 2096.940130][T27490] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2096.960517][T27490] CPU: 0 PID: 27490 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2096.970572][T27490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2096.980470][T27490] Call Trace: [ 2096.983593][T27490] [ 2096.986368][T27490] dump_stack_lvl+0x151/0x1b7 [ 2096.990885][T27490] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2096.996348][T27490] ? stack_trace_save+0x1f0/0x1f0 [ 2097.001214][T27490] ? __kernel_text_address+0x9a/0x110 [ 2097.006420][T27490] dump_stack+0x15/0x17 [ 2097.010411][T27490] should_fail+0x3c0/0x510 [ 2097.014677][T27490] should_fail_alloc_page+0x58/0x70 [ 2097.019696][T27490] __alloc_pages+0x1de/0x7c0 [ 2097.024123][T27490] ? stack_trace_save+0x12d/0x1f0 [ 2097.028986][T27490] ? stack_trace_snprint+0x100/0x100 [ 2097.034110][T27490] ? __count_vm_events+0x30/0x30 [ 2097.038881][T27490] ? __kasan_slab_alloc+0xc4/0xe0 [ 2097.043742][T27490] ? __kasan_slab_alloc+0xb2/0xe0 [ 2097.048603][T27490] ? kmem_cache_alloc+0x189/0x2f0 [ 2097.053459][T27490] ? anon_vma_fork+0x1b9/0x4f0 [ 2097.058064][T27490] get_zeroed_page+0x19/0x40 [ 2097.062490][T27490] __pud_alloc+0x8b/0x260 [ 2097.066657][T27490] ? do_handle_mm_fault+0x2370/0x2370 [ 2097.071859][T27490] ? __mmu_notifier_invalidate_range_start+0x656/0x6e0 [ 2097.078547][T27490] copy_page_range+0xd9e/0x1090 [ 2097.083236][T27490] ? pfn_valid+0x1e0/0x1e0 [ 2097.087487][T27490] dup_mmap+0x99f/0xea0 [ 2097.091477][T27490] ? __delayed_free_task+0x20/0x20 [ 2097.096423][T27490] ? mm_init+0x807/0x960 [ 2097.100504][T27490] dup_mm+0x91/0x330 [ 2097.104234][T27490] copy_mm+0x108/0x1b0 [ 2097.108141][T27490] copy_process+0x1295/0x3250 [ 2097.112655][T27490] ? check_stack_object+0xf7/0x130 [ 2097.117601][T27490] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2097.122547][T27490] ? copy_clone_args_from_user+0x6cf/0x790 [ 2097.128190][T27490] kernel_clone+0x22d/0x990 [ 2097.132531][T27490] ? dup_mmap+0xea0/0xea0 [ 2097.136694][T27490] ? create_io_thread+0x1e0/0x1e0 [ 2097.141554][T27490] ? file_end_write+0x1b0/0x1b0 [ 2097.146245][T27490] __x64_sys_clone3+0x375/0x3a0 [ 2097.150932][T27490] ? __ia32_sys_clone+0x300/0x300 [ 2097.155787][T27490] ? ksys_write+0x25f/0x2c0 [ 2097.160127][T27490] ? debug_smp_processor_id+0x17/0x20 [ 2097.165334][T27490] do_syscall_64+0x44/0xd0 [ 2097.169586][T27490] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2097.175314][T27490] RIP: 0033:0x7f8f8bc980c9 [ 2097.179568][T27490] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2097.199010][T27490] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2097.207259][T27490] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2097.215068][T27490] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2097.222877][T27490] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2097.230688][T27490] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 07:19:12 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xe600) 07:19:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 46) 07:19:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x900000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2097.238501][T27490] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2097.246313][T27490] [ 2097.336320][T27515] FAULT_INJECTION: forcing a failure. [ 2097.336320][T27515] name failslab, interval 1, probability 0, space 0, times 0 [ 2097.349187][T27515] CPU: 1 PID: 27515 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2097.359257][T27515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2097.369151][T27515] Call Trace: [ 2097.372274][T27515] [ 2097.375136][T27515] dump_stack_lvl+0x151/0x1b7 [ 2097.379649][T27515] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2097.384942][T27515] dump_stack+0x15/0x17 [ 2097.388935][T27515] should_fail+0x3c0/0x510 [ 2097.393188][T27515] __should_failslab+0x9f/0xe0 [ 2097.397787][T27515] should_failslab+0x9/0x20 [ 2097.402125][T27515] kmem_cache_alloc+0x4f/0x2f0 [ 2097.406725][T27515] ? vm_area_dup+0x26/0x1d0 [ 2097.411063][T27515] vm_area_dup+0x26/0x1d0 [ 2097.415232][T27515] dup_mmap+0x6b8/0xea0 [ 2097.419222][T27515] ? __delayed_free_task+0x20/0x20 [ 2097.424178][T27515] ? mm_init+0x807/0x960 [ 2097.428253][T27515] dup_mm+0x91/0x330 [ 2097.431981][T27515] copy_mm+0x108/0x1b0 [ 2097.435887][T27515] copy_process+0x1295/0x3250 [ 2097.440402][T27515] ? check_stack_object+0xf7/0x130 [ 2097.445351][T27515] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2097.450297][T27515] ? copy_clone_args_from_user+0x6cf/0x790 [ 2097.456073][T27515] kernel_clone+0x22d/0x990 [ 2097.460407][T27515] ? dup_mmap+0xea0/0xea0 [ 2097.464577][T27515] ? create_io_thread+0x1e0/0x1e0 [ 2097.469439][T27515] ? file_end_write+0x1b0/0x1b0 [ 2097.474131][T27515] __x64_sys_clone3+0x375/0x3a0 [ 2097.478808][T27515] ? __ia32_sys_clone+0x300/0x300 [ 2097.483669][T27515] ? ksys_write+0x25f/0x2c0 [ 2097.488016][T27515] ? debug_smp_processor_id+0x17/0x20 [ 2097.493217][T27515] do_syscall_64+0x44/0xd0 [ 2097.497477][T27515] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2097.503207][T27515] RIP: 0033:0x7f8f8bc980c9 [ 2097.507452][T27515] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2097.526898][T27515] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x9000000) 07:19:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 47) 07:19:13 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x1100000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2097.535179][T27515] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2097.542950][T27515] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2097.550770][T27515] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2097.558573][T27515] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2097.566388][T27515] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2097.574201][T27515] [ 2097.648128][T27520] FAULT_INJECTION: forcing a failure. [ 2097.648128][T27520] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2097.662939][T27520] CPU: 0 PID: 27520 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2097.672984][T27520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2097.682877][T27520] Call Trace: [ 2097.686004][T27520] [ 2097.688783][T27520] dump_stack_lvl+0x151/0x1b7 [ 2097.693302][T27520] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2097.698594][T27520] dump_stack+0x15/0x17 [ 2097.702582][T27520] should_fail+0x3c0/0x510 [ 2097.706839][T27520] should_fail_alloc_page+0x58/0x70 [ 2097.712046][T27520] __alloc_pages+0x1de/0x7c0 [ 2097.716474][T27520] ? __count_vm_events+0x30/0x30 [ 2097.721342][T27520] ? __this_cpu_preempt_check+0x13/0x20 [ 2097.726715][T27520] ? __mod_node_page_state+0xac/0xf0 [ 2097.731837][T27520] pte_alloc_one+0x73/0x1b0 [ 2097.736175][T27520] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2097.741210][T27520] __pte_alloc+0x86/0x350 [ 2097.745374][T27520] ? free_pgtables+0x210/0x210 [ 2097.749970][T27520] ? _raw_spin_lock+0xa3/0x1b0 [ 2097.754572][T27520] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2097.759776][T27520] ? __kernel_text_address+0x9a/0x110 [ 2097.764986][T27520] copy_pte_range+0x1b1f/0x20b0 [ 2097.769676][T27520] ? __kunmap_atomic+0x80/0x80 [ 2097.774270][T27520] ? __kasan_slab_alloc+0xc4/0xe0 [ 2097.779130][T27520] ? __kasan_slab_alloc+0xb2/0xe0 [ 2097.783991][T27520] ? kmem_cache_alloc+0x189/0x2f0 [ 2097.788893][T27520] ? vm_area_dup+0x26/0x1d0 [ 2097.793192][T27520] ? dup_mmap+0x6b8/0xea0 [ 2097.797366][T27520] ? dup_mm+0x91/0x330 [ 2097.801262][T27520] ? copy_mm+0x108/0x1b0 [ 2097.805342][T27520] ? copy_process+0x1295/0x3250 [ 2097.810038][T27520] ? kernel_clone+0x22d/0x990 [ 2097.814543][T27520] ? __x64_sys_clone3+0x375/0x3a0 [ 2097.819403][T27520] ? do_syscall_64+0x44/0xd0 [ 2097.823831][T27520] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2097.829741][T27520] copy_page_range+0xc1e/0x1090 [ 2097.834422][T27520] ? pfn_valid+0x1e0/0x1e0 [ 2097.838676][T27520] dup_mmap+0x99f/0xea0 [ 2097.842666][T27520] ? __delayed_free_task+0x20/0x20 [ 2097.847612][T27520] ? mm_init+0x807/0x960 [ 2097.851693][T27520] dup_mm+0x91/0x330 [ 2097.855424][T27520] copy_mm+0x108/0x1b0 [ 2097.859329][T27520] copy_process+0x1295/0x3250 [ 2097.863844][T27520] ? check_stack_object+0xf7/0x130 [ 2097.868792][T27520] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2097.873737][T27520] ? copy_clone_args_from_user+0x6cf/0x790 [ 2097.879379][T27520] kernel_clone+0x22d/0x990 [ 2097.883718][T27520] ? dup_mmap+0xea0/0xea0 [ 2097.887887][T27520] ? create_io_thread+0x1e0/0x1e0 [ 2097.892746][T27520] ? file_end_write+0x1b0/0x1b0 [ 2097.897434][T27520] __x64_sys_clone3+0x375/0x3a0 [ 2097.902120][T27520] ? __ia32_sys_clone+0x300/0x300 [ 2097.906981][T27520] ? ksys_write+0x25f/0x2c0 [ 2097.911323][T27520] ? debug_smp_processor_id+0x17/0x20 [ 2097.916530][T27520] do_syscall_64+0x44/0xd0 [ 2097.920781][T27520] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2097.926510][T27520] RIP: 0033:0x7f8f8bc980c9 [ 2097.930765][T27520] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2097.950202][T27520] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2097.958453][T27520] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2097.966259][T27520] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2097.974070][T27520] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2097.981884][T27520] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2097.989701][T27520] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 07:19:13 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 07:19:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x14ae02a0ffffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:13 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xe800) [ 2097.997510][T27520] 07:19:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 48) 07:19:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x1f00000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2098.107884][T27540] FAULT_INJECTION: forcing a failure. [ 2098.107884][T27540] name failslab, interval 1, probability 0, space 0, times 0 [ 2098.127243][T27540] CPU: 1 PID: 27540 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2098.137312][T27540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2098.147208][T27540] Call Trace: [ 2098.150331][T27540] [ 2098.153108][T27540] dump_stack_lvl+0x151/0x1b7 [ 2098.157631][T27540] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2098.162918][T27540] dump_stack+0x15/0x17 [ 2098.166909][T27540] should_fail+0x3c0/0x510 [ 2098.171162][T27540] __should_failslab+0x9f/0xe0 [ 2098.175774][T27540] should_failslab+0x9/0x20 [ 2098.180101][T27540] kmem_cache_alloc+0x4f/0x2f0 [ 2098.184702][T27540] ? vm_area_dup+0x26/0x1d0 [ 2098.189046][T27540] vm_area_dup+0x26/0x1d0 [ 2098.193206][T27540] dup_mmap+0x6b8/0xea0 [ 2098.197289][T27540] ? __delayed_free_task+0x20/0x20 [ 2098.202237][T27540] ? mm_init+0x807/0x960 [ 2098.206318][T27540] dup_mm+0x91/0x330 [ 2098.210046][T27540] copy_mm+0x108/0x1b0 [ 2098.213953][T27540] copy_process+0x1295/0x3250 [ 2098.218478][T27540] ? check_stack_object+0xf7/0x130 [ 2098.223676][T27540] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2098.228620][T27540] ? copy_clone_args_from_user+0x6cf/0x790 [ 2098.234265][T27540] kernel_clone+0x22d/0x990 [ 2098.238775][T27540] ? dup_mmap+0xea0/0xea0 [ 2098.242943][T27540] ? create_io_thread+0x1e0/0x1e0 [ 2098.247801][T27540] ? file_end_write+0x1b0/0x1b0 [ 2098.252489][T27540] __x64_sys_clone3+0x375/0x3a0 [ 2098.257179][T27540] ? __ia32_sys_clone+0x300/0x300 [ 2098.262036][T27540] ? ksys_write+0x25f/0x2c0 [ 2098.266491][T27540] ? debug_smp_processor_id+0x17/0x20 [ 2098.271677][T27540] do_syscall_64+0x44/0xd0 [ 2098.275930][T27540] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2098.281653][T27540] RIP: 0033:0x7f8f8bc980c9 [ 2098.285915][T27540] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 49) [ 2098.305437][T27540] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2098.313678][T27540] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2098.321490][T27540] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2098.329300][T27540] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2098.337111][T27540] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2098.344923][T27540] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2098.352738][T27540] 07:19:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x2000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x19000000) [ 2098.449750][T27559] FAULT_INJECTION: forcing a failure. [ 2098.449750][T27559] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2098.463440][T27559] CPU: 0 PID: 27559 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2098.473499][T27559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2098.483391][T27559] Call Trace: [ 2098.486515][T27559] [ 2098.489291][T27559] dump_stack_lvl+0x151/0x1b7 [ 2098.493808][T27559] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2098.499099][T27559] ? __switch_to+0x617/0x1170 [ 2098.503636][T27559] ? native_set_ldt+0x360/0x360 [ 2098.508308][T27559] ? __update_load_avg_cfs_rq+0xb0/0x2f0 [ 2098.513767][T27559] dump_stack+0x15/0x17 [ 2098.517757][T27559] should_fail+0x3c0/0x510 [ 2098.522015][T27559] should_fail_alloc_page+0x58/0x70 [ 2098.527049][T27559] __alloc_pages+0x1de/0x7c0 [ 2098.531473][T27559] ? __count_vm_events+0x30/0x30 [ 2098.536256][T27559] ? __kasan_check_read+0x11/0x20 [ 2098.541108][T27559] pte_alloc_one+0x73/0x1b0 [ 2098.545446][T27559] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2098.550488][T27559] ? preempt_schedule+0xd9/0xe0 [ 2098.555168][T27559] ? preempt_schedule_common+0xcb/0x100 [ 2098.560550][T27559] __pte_alloc+0x86/0x350 [ 2098.564714][T27559] ? free_pgtables+0x210/0x210 [ 2098.569314][T27559] ? _raw_spin_lock+0xa3/0x1b0 [ 2098.573917][T27559] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2098.579123][T27559] ? preempt_schedule_thunk+0x16/0x18 [ 2098.584331][T27559] copy_pte_range+0x1b1f/0x20b0 [ 2098.589101][T27559] ? __kunmap_atomic+0x80/0x80 [ 2098.593619][T27559] ? release_firmware_map_entry+0x193/0x193 [ 2098.599344][T27559] ? kmem_cache_alloc+0x189/0x2f0 [ 2098.604209][T27559] ? dup_mmap+0x6b8/0xea0 [ 2098.608397][T27559] ? dup_mm+0x91/0x330 [ 2098.612276][T27559] ? copy_mm+0x108/0x1b0 [ 2098.616357][T27559] ? kernel_clone+0x22d/0x990 [ 2098.620876][T27559] ? __x64_sys_clone3+0x375/0x3a0 [ 2098.625732][T27559] ? do_syscall_64+0x44/0xd0 [ 2098.630160][T27559] ? preempt_schedule_irq+0xef/0x140 [ 2098.635280][T27559] copy_page_range+0xc1e/0x1090 [ 2098.639975][T27559] ? pfn_valid+0x1e0/0x1e0 [ 2098.644220][T27559] dup_mmap+0x99f/0xea0 [ 2098.648301][T27559] ? __delayed_free_task+0x20/0x20 [ 2098.653335][T27559] ? mm_init+0x807/0x960 [ 2098.657410][T27559] dup_mm+0x91/0x330 [ 2098.661169][T27559] copy_mm+0x108/0x1b0 [ 2098.665051][T27559] copy_process+0x1295/0x3250 [ 2098.669568][T27559] ? __check_object_size+0x76/0x3d0 [ 2098.674598][T27559] ? __sanitizer_cov_trace_pc+0x1/0x60 [ 2098.679895][T27559] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2098.684838][T27559] ? copy_clone_args_from_user+0x6cf/0x790 [ 2098.694243][T27559] kernel_clone+0x22d/0x990 [ 2098.698582][T27559] ? dup_mmap+0xea0/0xea0 [ 2098.702747][T27559] ? create_io_thread+0x1e0/0x1e0 [ 2098.707610][T27559] __x64_sys_clone3+0x375/0x3a0 [ 2098.712295][T27559] ? __ia32_sys_clone+0x300/0x300 [ 2098.717157][T27559] ? __kasan_check_write+0x14/0x20 [ 2098.722103][T27559] ? fpregs_restore_userregs+0x1f0/0x3a0 [ 2098.727573][T27559] ? arch_exit_to_user_mode_prepare+0x48/0x70 [ 2098.733475][T27559] do_syscall_64+0x44/0xd0 [ 2098.737725][T27559] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2098.743455][T27559] RIP: 0033:0x7f8f8bc980c9 [ 2098.747710][T27559] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2098.767148][T27559] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2098.775394][T27559] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2098.783206][T27559] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2098.791018][T27559] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 07:19:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 50) [ 2098.798830][T27559] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2098.806643][T27559] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2098.814455][T27559] 07:19:14 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xea00) 07:19:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x4000000000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2098.919062][T27566] FAULT_INJECTION: forcing a failure. [ 2098.919062][T27566] name failslab, interval 1, probability 0, space 0, times 0 [ 2098.931516][T27566] CPU: 0 PID: 27566 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2098.941532][T27566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2098.951426][T27566] Call Trace: [ 2098.954545][T27566] [ 2098.957328][T27566] dump_stack_lvl+0x151/0x1b7 [ 2098.961837][T27566] ? bfq_pos_tree_add_move+0x43e/0x43e 07:19:14 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 2098.967134][T27566] dump_stack+0x15/0x17 [ 2098.971123][T27566] should_fail+0x3c0/0x510 [ 2098.975398][T27566] __should_failslab+0x9f/0xe0 [ 2098.979978][T27566] should_failslab+0x9/0x20 [ 2098.984321][T27566] kmem_cache_alloc+0x4f/0x2f0 [ 2098.988921][T27566] ? vm_area_dup+0x26/0x1d0 [ 2098.993300][T27566] vm_area_dup+0x26/0x1d0 [ 2098.997423][T27566] dup_mmap+0x6b8/0xea0 [ 2099.001420][T27566] ? __delayed_free_task+0x20/0x20 [ 2099.006364][T27566] ? mm_init+0x807/0x960 [ 2099.010443][T27566] dup_mm+0x91/0x330 [ 2099.014183][T27566] copy_mm+0x108/0x1b0 [ 2099.018084][T27566] copy_process+0x1295/0x3250 [ 2099.022888][T27566] ? check_stack_object+0xf7/0x130 [ 2099.027804][T27566] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2099.032751][T27566] ? copy_clone_args_from_user+0x6cf/0x790 [ 2099.038389][T27566] kernel_clone+0x22d/0x990 [ 2099.042731][T27566] ? dup_mmap+0xea0/0xea0 [ 2099.046896][T27566] ? create_io_thread+0x1e0/0x1e0 [ 2099.051756][T27566] ? file_end_write+0x1b0/0x1b0 [ 2099.056441][T27566] __x64_sys_clone3+0x375/0x3a0 [ 2099.061127][T27566] ? __ia32_sys_clone+0x300/0x300 [ 2099.066005][T27566] ? ksys_write+0x25f/0x2c0 [ 2099.070337][T27566] ? debug_smp_processor_id+0x17/0x20 [ 2099.075538][T27566] do_syscall_64+0x44/0xd0 [ 2099.079792][T27566] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2099.085514][T27566] RIP: 0033:0x7f8f8bc980c9 [ 2099.089769][T27566] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2099.109216][T27566] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xf5ffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 51) [ 2099.117454][T27566] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2099.125266][T27566] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2099.133080][T27566] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2099.140889][T27566] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2099.148700][T27566] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2099.156604][T27566] 07:19:14 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xec00) 07:19:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xfbffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2099.241503][T27590] FAULT_INJECTION: forcing a failure. [ 2099.241503][T27590] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.255508][T27590] CPU: 1 PID: 27590 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2099.265575][T27590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2099.275473][T27590] Call Trace: [ 2099.278594][T27590] [ 2099.281372][T27590] dump_stack_lvl+0x151/0x1b7 [ 2099.285885][T27590] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2099.291182][T27590] dump_stack+0x15/0x17 [ 2099.295171][T27590] should_fail+0x3c0/0x510 [ 2099.299423][T27590] __should_failslab+0x9f/0xe0 [ 2099.304042][T27590] should_failslab+0x9/0x20 [ 2099.308394][T27590] kmem_cache_alloc+0x4f/0x2f0 [ 2099.312964][T27590] ? anon_vma_fork+0x1b9/0x4f0 [ 2099.317566][T27590] anon_vma_fork+0x1b9/0x4f0 [ 2099.321993][T27590] dup_mmap+0x750/0xea0 [ 2099.325985][T27590] ? __delayed_free_task+0x20/0x20 [ 2099.330929][T27590] ? mm_init+0x807/0x960 [ 2099.335012][T27590] dup_mm+0x91/0x330 [ 2099.338743][T27590] copy_mm+0x108/0x1b0 [ 2099.342650][T27590] copy_process+0x1295/0x3250 [ 2099.347165][T27590] ? check_stack_object+0xf7/0x130 [ 2099.352111][T27590] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2099.357055][T27590] ? copy_clone_args_from_user+0x6cf/0x790 [ 2099.362696][T27590] kernel_clone+0x22d/0x990 [ 2099.367042][T27590] ? dup_mmap+0xea0/0xea0 [ 2099.371201][T27590] ? create_io_thread+0x1e0/0x1e0 [ 2099.376066][T27590] ? file_end_write+0x1b0/0x1b0 [ 2099.380752][T27590] __x64_sys_clone3+0x375/0x3a0 [ 2099.385436][T27590] ? __ia32_sys_clone+0x300/0x300 [ 2099.390325][T27590] ? ksys_write+0x25f/0x2c0 [ 2099.394638][T27590] ? debug_smp_processor_id+0x17/0x20 [ 2099.399847][T27590] do_syscall_64+0x44/0xd0 [ 2099.404098][T27590] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2099.409825][T27590] RIP: 0033:0x7f8f8bc980c9 [ 2099.414082][T27590] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2099.433526][T27590] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x88290000) 07:19:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 52) [ 2099.441777][T27590] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2099.449577][T27590] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2099.457388][T27590] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2099.465201][T27590] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2099.473018][T27590] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2099.480830][T27590] 07:19:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xff0f010000000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2099.589590][T27598] FAULT_INJECTION: forcing a failure. [ 2099.589590][T27598] name failslab, interval 1, probability 0, space 0, times 0 [ 2099.602378][T27598] CPU: 1 PID: 27598 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2099.612441][T27598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2099.622335][T27598] Call Trace: [ 2099.625458][T27598] [ 2099.628238][T27598] dump_stack_lvl+0x151/0x1b7 [ 2099.632754][T27598] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2099.638049][T27598] dump_stack+0x15/0x17 [ 2099.642036][T27598] should_fail+0x3c0/0x510 [ 2099.646289][T27598] __should_failslab+0x9f/0xe0 [ 2099.650889][T27598] should_failslab+0x9/0x20 [ 2099.655229][T27598] kmem_cache_alloc+0x4f/0x2f0 [ 2099.659828][T27598] ? anon_vma_fork+0x1b9/0x4f0 [ 2099.664428][T27598] anon_vma_fork+0x1b9/0x4f0 [ 2099.668868][T27598] dup_mmap+0x750/0xea0 [ 2099.672851][T27598] ? __delayed_free_task+0x20/0x20 [ 2099.677801][T27598] ? mm_init+0x807/0x960 [ 2099.681877][T27598] dup_mm+0x91/0x330 [ 2099.685606][T27598] copy_mm+0x108/0x1b0 [ 2099.689516][T27598] copy_process+0x1295/0x3250 [ 2099.694049][T27598] ? check_stack_object+0xf7/0x130 [ 2099.699061][T27598] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2099.704006][T27598] ? copy_clone_args_from_user+0x6cf/0x790 [ 2099.709736][T27598] kernel_clone+0x22d/0x990 [ 2099.714164][T27598] ? dup_mmap+0xea0/0xea0 [ 2099.718329][T27598] ? create_io_thread+0x1e0/0x1e0 [ 2099.723187][T27598] ? file_end_write+0x1b0/0x1b0 [ 2099.727962][T27598] __x64_sys_clone3+0x375/0x3a0 [ 2099.732648][T27598] ? __ia32_sys_clone+0x300/0x300 [ 2099.737515][T27598] ? __kasan_check_write+0x14/0x20 [ 2099.742459][T27598] ? switch_fpu_return+0xe/0x10 [ 2099.747145][T27598] do_syscall_64+0x44/0xd0 [ 2099.751400][T27598] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2099.757125][T27598] RIP: 0033:0x7f8f8bc980c9 [ 2099.761378][T27598] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2099.780823][T27598] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 53) [ 2099.789068][T27598] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2099.796876][T27598] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2099.804694][T27598] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2099.812501][T27598] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2099.820309][T27598] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2099.828130][T27598] 07:19:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xffffffff00000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:15 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 07:19:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0xffffffffa002ae14, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2099.928415][T27606] FAULT_INJECTION: forcing a failure. [ 2099.928415][T27606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2099.941789][T27606] CPU: 1 PID: 27606 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2099.951932][T27606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2099.961824][T27606] Call Trace: [ 2099.964947][T27606] [ 2099.967730][T27606] dump_stack_lvl+0x151/0x1b7 [ 2099.972238][T27606] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2099.977533][T27606] ? stack_trace_save+0x1f0/0x1f0 [ 2099.982393][T27606] ? __kernel_text_address+0x9a/0x110 [ 2099.987603][T27606] dump_stack+0x15/0x17 [ 2099.991592][T27606] should_fail+0x3c0/0x510 [ 2099.995846][T27606] should_fail_alloc_page+0x58/0x70 [ 2100.000882][T27606] __alloc_pages+0x1de/0x7c0 [ 2100.005307][T27606] ? stack_trace_save+0x12d/0x1f0 [ 2100.010172][T27606] ? stack_trace_snprint+0x100/0x100 [ 2100.015389][T27606] ? __count_vm_events+0x30/0x30 [ 2100.020163][T27606] ? __kasan_slab_alloc+0xc4/0xe0 [ 2100.025025][T27606] ? __kasan_slab_alloc+0xb2/0xe0 [ 2100.029883][T27606] ? kmem_cache_alloc+0x189/0x2f0 [ 2100.034749][T27606] ? anon_vma_fork+0x1b9/0x4f0 [ 2100.039345][T27606] get_zeroed_page+0x19/0x40 [ 2100.043773][T27606] __pud_alloc+0x8b/0x260 [ 2100.047939][T27606] ? do_handle_mm_fault+0x2370/0x2370 [ 2100.053150][T27606] ? __mmu_notifier_invalidate_range_start+0x656/0x6e0 [ 2100.059835][T27606] copy_page_range+0xd9e/0x1090 [ 2100.064520][T27606] ? pfn_valid+0x1e0/0x1e0 [ 2100.068770][T27606] dup_mmap+0x99f/0xea0 [ 2100.072764][T27606] ? __delayed_free_task+0x20/0x20 [ 2100.077709][T27606] ? mm_init+0x807/0x960 [ 2100.081788][T27606] dup_mm+0x91/0x330 [ 2100.085521][T27606] copy_mm+0x108/0x1b0 [ 2100.089430][T27606] copy_process+0x1295/0x3250 [ 2100.093943][T27606] ? check_stack_object+0xf7/0x130 [ 2100.098886][T27606] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2100.103831][T27606] ? copy_clone_args_from_user+0x6cf/0x790 [ 2100.109476][T27606] kernel_clone+0x22d/0x990 [ 2100.113816][T27606] ? dup_mmap+0xea0/0xea0 [ 2100.117988][T27606] ? create_io_thread+0x1e0/0x1e0 [ 2100.122842][T27606] ? file_end_write+0x1b0/0x1b0 [ 2100.127527][T27606] __x64_sys_clone3+0x375/0x3a0 [ 2100.132215][T27606] ? __ia32_sys_clone+0x300/0x300 [ 2100.137080][T27606] ? ksys_write+0x25f/0x2c0 [ 2100.141423][T27606] ? debug_smp_processor_id+0x17/0x20 [ 2100.146625][T27606] do_syscall_64+0x44/0xd0 [ 2100.150876][T27606] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2100.156606][T27606] RIP: 0033:0x7f8f8bc980c9 [ 2100.160856][T27606] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2100.180300][T27606] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2100.188544][T27606] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2100.196357][T27606] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2100.204173][T27606] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2100.211982][T27606] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2100.219791][T27606] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 07:19:15 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xee00) 07:19:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 54) 07:19:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2100.227605][T27606] 07:19:15 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/12], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x9effffff) [ 2100.322750][T27628] FAULT_INJECTION: forcing a failure. [ 2100.322750][T27628] name failslab, interval 1, probability 0, space 0, times 0 [ 2100.367775][T27628] CPU: 0 PID: 27628 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2100.377847][T27628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2100.387739][T27628] Call Trace: [ 2100.390864][T27628] [ 2100.393645][T27628] dump_stack_lvl+0x151/0x1b7 [ 2100.398153][T27628] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2100.403451][T27628] dump_stack+0x15/0x17 [ 2100.407444][T27628] should_fail+0x3c0/0x510 [ 2100.411694][T27628] __should_failslab+0x9f/0xe0 [ 2100.416297][T27628] should_failslab+0x9/0x20 [ 2100.420632][T27628] kmem_cache_alloc+0x4f/0x2f0 [ 2100.425230][T27628] ? vm_area_dup+0x26/0x1d0 [ 2100.429576][T27628] vm_area_dup+0x26/0x1d0 [ 2100.433740][T27628] dup_mmap+0x6b8/0xea0 [ 2100.437732][T27628] ? __delayed_free_task+0x20/0x20 [ 2100.442678][T27628] ? mm_init+0x807/0x960 [ 2100.446755][T27628] dup_mm+0x91/0x330 [ 2100.450489][T27628] copy_mm+0x108/0x1b0 [ 2100.454395][T27628] copy_process+0x1295/0x3250 [ 2100.458910][T27628] ? check_stack_object+0xf7/0x130 [ 2100.463961][T27628] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2100.468901][T27628] ? copy_clone_args_from_user+0x6cf/0x790 [ 2100.474548][T27628] kernel_clone+0x22d/0x990 [ 2100.478883][T27628] ? dup_mmap+0xea0/0xea0 [ 2100.483067][T27628] ? create_io_thread+0x1e0/0x1e0 [ 2100.487937][T27628] ? file_end_write+0x1b0/0x1b0 [ 2100.492597][T27628] __x64_sys_clone3+0x375/0x3a0 [ 2100.497283][T27628] ? __ia32_sys_clone+0x300/0x300 [ 2100.502144][T27628] ? ksys_write+0x25f/0x2c0 [ 2100.506484][T27628] ? debug_smp_processor_id+0x17/0x20 [ 2100.511688][T27628] do_syscall_64+0x44/0xd0 [ 2100.515942][T27628] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2100.521670][T27628] RIP: 0033:0x7f8f8bc980c9 [ 2100.525924][T27628] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2100.545364][T27628] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2100.553611][T27628] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 07:19:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2100.561426][T27628] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2100.569232][T27628] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2100.577044][T27628] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2100.584857][T27628] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2100.592679][T27628] 07:19:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 55) 07:19:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x7}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:16 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xf000) [ 2100.769980][T27643] FAULT_INJECTION: forcing a failure. [ 2100.769980][T27643] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2100.783336][T27643] CPU: 1 PID: 27643 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2100.793399][T27643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2100.803295][T27643] Call Trace: [ 2100.806421][T27643] [ 2100.809196][T27643] dump_stack_lvl+0x151/0x1b7 [ 2100.813707][T27643] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2100.819010][T27643] dump_stack+0x15/0x17 [ 2100.822994][T27643] should_fail+0x3c0/0x510 [ 2100.827249][T27643] should_fail_alloc_page+0x58/0x70 [ 2100.832285][T27643] __alloc_pages+0x1de/0x7c0 [ 2100.836714][T27643] ? __count_vm_events+0x30/0x30 [ 2100.841481][T27643] ? __this_cpu_preempt_check+0x13/0x20 [ 2100.846860][T27643] ? __mod_node_page_state+0xac/0xf0 [ 2100.851987][T27643] pte_alloc_one+0x73/0x1b0 [ 2100.856322][T27643] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2100.861356][T27643] __pte_alloc+0x86/0x350 [ 2100.865523][T27643] ? free_pgtables+0x210/0x210 [ 2100.870122][T27643] ? _raw_spin_lock+0xa3/0x1b0 [ 2100.874722][T27643] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2100.879932][T27643] ? __kernel_text_address+0x9a/0x110 [ 2100.885139][T27643] copy_pte_range+0x1b1f/0x20b0 [ 2100.889828][T27643] ? __kunmap_atomic+0x80/0x80 [ 2100.894425][T27643] ? __kasan_slab_alloc+0xc4/0xe0 [ 2100.899321][T27643] ? __kasan_slab_alloc+0xb2/0xe0 [ 2100.904149][T27643] ? kmem_cache_alloc+0x189/0x2f0 [ 2100.909005][T27643] ? vm_area_dup+0x26/0x1d0 [ 2100.913350][T27643] ? dup_mmap+0x6b8/0xea0 [ 2100.917511][T27643] ? dup_mm+0x91/0x330 [ 2100.921418][T27643] ? copy_mm+0x108/0x1b0 [ 2100.925495][T27643] ? copy_process+0x1295/0x3250 [ 2100.930184][T27643] ? kernel_clone+0x22d/0x990 [ 2100.934696][T27643] ? __x64_sys_clone3+0x375/0x3a0 [ 2100.939556][T27643] ? do_syscall_64+0x44/0xd0 [ 2100.945805][T27643] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2100.951718][T27643] copy_page_range+0xc1e/0x1090 [ 2100.956398][T27643] ? pfn_valid+0x1e0/0x1e0 [ 2100.960654][T27643] dup_mmap+0x99f/0xea0 [ 2100.964640][T27643] ? __delayed_free_task+0x20/0x20 [ 2100.969587][T27643] ? mm_init+0x807/0x960 [ 2100.973670][T27643] dup_mm+0x91/0x330 [ 2100.977405][T27643] copy_mm+0x108/0x1b0 [ 2100.981309][T27643] copy_process+0x1295/0x3250 [ 2100.985820][T27643] ? check_stack_object+0xf7/0x130 [ 2100.990765][T27643] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2100.995712][T27643] ? copy_clone_args_from_user+0x6cf/0x790 [ 2101.001355][T27643] kernel_clone+0x22d/0x990 [ 2101.005710][T27643] ? dup_mmap+0xea0/0xea0 [ 2101.009879][T27643] ? create_io_thread+0x1e0/0x1e0 [ 2101.014720][T27643] ? file_end_write+0x1b0/0x1b0 [ 2101.019408][T27643] __x64_sys_clone3+0x375/0x3a0 [ 2101.024098][T27643] ? __ia32_sys_clone+0x300/0x300 [ 2101.028955][T27643] ? ksys_write+0x25f/0x2c0 [ 2101.033304][T27643] ? debug_smp_processor_id+0x17/0x20 [ 2101.038501][T27643] do_syscall_64+0x44/0xd0 [ 2101.042928][T27643] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2101.049179][T27643] RIP: 0033:0x7f8f8bc980c9 [ 2101.053444][T27643] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2101.072977][T27643] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2101.081222][T27643] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2101.089036][T27643] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2101.096849][T27643] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2101.104659][T27643] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2101.112469][T27643] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 07:19:16 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 07:19:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 56) 07:19:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x8}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2101.120289][T27643] 07:19:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0xefffffff) 07:19:16 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/12], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x9}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2101.217854][T27659] FAULT_INJECTION: forcing a failure. [ 2101.217854][T27659] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.248972][T27659] CPU: 0 PID: 27659 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2101.259048][T27659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2101.268941][T27659] Call Trace: [ 2101.272069][T27659] [ 2101.274842][T27659] dump_stack_lvl+0x151/0x1b7 [ 2101.279352][T27659] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2101.284648][T27659] dump_stack+0x15/0x17 [ 2101.288637][T27659] should_fail+0x3c0/0x510 [ 2101.292893][T27659] __should_failslab+0x9f/0xe0 [ 2101.297490][T27659] should_failslab+0x9/0x20 [ 2101.301828][T27659] kmem_cache_alloc+0x4f/0x2f0 [ 2101.306430][T27659] ? vm_area_dup+0x26/0x1d0 [ 2101.310770][T27659] vm_area_dup+0x26/0x1d0 [ 2101.314938][T27659] dup_mmap+0x6b8/0xea0 [ 2101.318929][T27659] ? __delayed_free_task+0x20/0x20 [ 2101.323877][T27659] ? mm_init+0x807/0x960 [ 2101.327956][T27659] dup_mm+0x91/0x330 [ 2101.331686][T27659] copy_mm+0x108/0x1b0 [ 2101.335592][T27659] copy_process+0x1295/0x3250 [ 2101.340629][T27659] ? check_stack_object+0xf7/0x130 [ 2101.345576][T27659] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2101.350521][T27659] ? copy_clone_args_from_user+0x6cf/0x790 [ 2101.356164][T27659] kernel_clone+0x22d/0x990 [ 2101.360505][T27659] ? dup_mmap+0xea0/0xea0 [ 2101.364668][T27659] ? create_io_thread+0x1e0/0x1e0 [ 2101.369529][T27659] ? file_end_write+0x1b0/0x1b0 [ 2101.374218][T27659] __x64_sys_clone3+0x375/0x3a0 [ 2101.378907][T27659] ? __ia32_sys_clone+0x300/0x300 [ 2101.383766][T27659] ? ksys_write+0x25f/0x2c0 [ 2101.388106][T27659] ? debug_smp_processor_id+0x17/0x20 [ 2101.393310][T27659] do_syscall_64+0x44/0xd0 [ 2101.397567][T27659] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2101.403291][T27659] RIP: 0033:0x7f8f8bc980c9 [ 2101.407550][T27659] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2101.426990][T27659] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2101.435233][T27659] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2101.443059][T27659] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2101.450866][T27659] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2101.458669][T27659] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2101.466482][T27659] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2101.474295][T27659] 07:19:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:17 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xf200) 07:19:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x70}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x700}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 57) 07:19:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x900}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2101.942517][T27694] FAULT_INJECTION: forcing a failure. [ 2101.942517][T27694] name failslab, interval 1, probability 0, space 0, times 0 [ 2101.955069][T27694] CPU: 0 PID: 27694 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2101.965124][T27694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2101.975019][T27694] Call Trace: [ 2101.978141][T27694] [ 2101.980920][T27694] dump_stack_lvl+0x151/0x1b7 [ 2101.985435][T27694] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2101.990727][T27694] dump_stack+0x15/0x17 [ 2101.994717][T27694] should_fail+0x3c0/0x510 [ 2101.998971][T27694] __should_failslab+0x9f/0xe0 [ 2102.003571][T27694] should_failslab+0x9/0x20 [ 2102.007915][T27694] kmem_cache_alloc+0x4f/0x2f0 [ 2102.012516][T27694] ? vm_area_dup+0x26/0x1d0 [ 2102.016850][T27694] vm_area_dup+0x26/0x1d0 [ 2102.021032][T27694] dup_mmap+0x6b8/0xea0 [ 2102.025017][T27694] ? __delayed_free_task+0x20/0x20 [ 2102.029961][T27694] ? mm_init+0x807/0x960 [ 2102.034034][T27694] dup_mm+0x91/0x330 [ 2102.037767][T27694] copy_mm+0x108/0x1b0 [ 2102.041674][T27694] copy_process+0x1295/0x3250 [ 2102.046186][T27694] ? check_stack_object+0xf7/0x130 [ 2102.051134][T27694] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2102.056080][T27694] ? copy_clone_args_from_user+0x6cf/0x790 [ 2102.061722][T27694] kernel_clone+0x22d/0x990 [ 2102.066060][T27694] ? dup_mmap+0xea0/0xea0 [ 2102.070228][T27694] ? create_io_thread+0x1e0/0x1e0 [ 2102.075087][T27694] ? file_end_write+0x1b0/0x1b0 [ 2102.079774][T27694] __x64_sys_clone3+0x375/0x3a0 [ 2102.084460][T27694] ? __ia32_sys_clone+0x300/0x300 [ 2102.089326][T27694] ? ksys_write+0x25f/0x2c0 [ 2102.093665][T27694] ? debug_smp_processor_id+0x17/0x20 [ 2102.098869][T27694] do_syscall_64+0x44/0xd0 [ 2102.103123][T27694] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2102.108855][T27694] RIP: 0033:0x7f8f8bc980c9 [ 2102.113105][T27694] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2102.132631][T27694] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:17 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x19000000}, 0x0) 07:19:17 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xf400) 07:19:17 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/12], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x1100}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0xf0ffffff) 07:19:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 58) [ 2102.140965][T27694] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2102.148783][T27694] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2102.156595][T27694] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2102.164406][T27694] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2102.172216][T27694] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2102.180024][T27694] [ 2102.268838][T27699] FAULT_INJECTION: forcing a failure. [ 2102.268838][T27699] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.285734][T27699] CPU: 0 PID: 27699 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2102.297013][T27699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2102.306911][T27699] Call Trace: [ 2102.310032][T27699] [ 2102.312808][T27699] dump_stack_lvl+0x151/0x1b7 [ 2102.317367][T27699] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2102.322621][T27699] dump_stack+0x15/0x17 [ 2102.326608][T27699] should_fail+0x3c0/0x510 [ 2102.330866][T27699] __should_failslab+0x9f/0xe0 [ 2102.335463][T27699] should_failslab+0x9/0x20 [ 2102.339805][T27699] kmem_cache_alloc+0x4f/0x2f0 [ 2102.344402][T27699] ? vm_area_dup+0x26/0x1d0 [ 2102.348745][T27699] vm_area_dup+0x26/0x1d0 [ 2102.352922][T27699] dup_mmap+0x6b8/0xea0 [ 2102.356918][T27699] ? __delayed_free_task+0x20/0x20 [ 2102.361848][T27699] ? mm_init+0x807/0x960 [ 2102.365929][T27699] dup_mm+0x91/0x330 [ 2102.369660][T27699] copy_mm+0x108/0x1b0 [ 2102.373565][T27699] copy_process+0x1295/0x3250 [ 2102.378083][T27699] ? check_stack_object+0xf7/0x130 [ 2102.383027][T27699] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2102.387974][T27699] ? copy_clone_args_from_user+0x6cf/0x790 [ 2102.393620][T27699] kernel_clone+0x22d/0x990 [ 2102.397958][T27699] ? dup_mmap+0xea0/0xea0 [ 2102.402122][T27699] ? create_io_thread+0x1e0/0x1e0 [ 2102.406980][T27699] ? file_end_write+0x1b0/0x1b0 [ 2102.411672][T27699] __x64_sys_clone3+0x375/0x3a0 [ 2102.416358][T27699] ? __ia32_sys_clone+0x300/0x300 [ 2102.421305][T27699] ? ksys_write+0x25f/0x2c0 [ 2102.425642][T27699] ? debug_smp_processor_id+0x17/0x20 [ 2102.430858][T27699] do_syscall_64+0x44/0xd0 [ 2102.435107][T27699] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2102.440833][T27699] RIP: 0033:0x7f8f8bc980c9 [ 2102.445085][T27699] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 59) 07:19:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x1f00}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2102.464529][T27699] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2102.472778][T27699] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2102.480585][T27699] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2102.488412][T27699] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2102.496208][T27699] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2102.504021][T27699] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2102.511829][T27699] 07:19:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x2000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xf600) [ 2102.588098][T27721] FAULT_INJECTION: forcing a failure. [ 2102.588098][T27721] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.601183][T27721] CPU: 0 PID: 27721 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2102.611247][T27721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2102.621142][T27721] Call Trace: [ 2102.624263][T27721] [ 2102.627042][T27721] dump_stack_lvl+0x151/0x1b7 [ 2102.631557][T27721] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2102.636851][T27721] dump_stack+0x15/0x17 [ 2102.640842][T27721] should_fail+0x3c0/0x510 [ 2102.645091][T27721] __should_failslab+0x9f/0xe0 [ 2102.649715][T27721] should_failslab+0x9/0x20 [ 2102.654033][T27721] kmem_cache_alloc+0x4f/0x2f0 [ 2102.658630][T27721] ? vm_area_dup+0x26/0x1d0 [ 2102.662972][T27721] vm_area_dup+0x26/0x1d0 [ 2102.667138][T27721] dup_mmap+0x6b8/0xea0 [ 2102.671139][T27721] ? __delayed_free_task+0x20/0x20 [ 2102.676081][T27721] ? mm_init+0x807/0x960 [ 2102.680155][T27721] dup_mm+0x91/0x330 [ 2102.683887][T27721] copy_mm+0x108/0x1b0 [ 2102.687794][T27721] copy_process+0x1295/0x3250 [ 2102.692310][T27721] ? check_stack_object+0xf7/0x130 [ 2102.697255][T27721] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2102.702202][T27721] ? copy_clone_args_from_user+0x6cf/0x790 [ 2102.707846][T27721] kernel_clone+0x22d/0x990 [ 2102.712182][T27721] ? dup_mmap+0xea0/0xea0 [ 2102.716350][T27721] ? create_io_thread+0x1e0/0x1e0 [ 2102.721211][T27721] ? file_end_write+0x1b0/0x1b0 [ 2102.725896][T27721] __x64_sys_clone3+0x375/0x3a0 [ 2102.730586][T27721] ? __ia32_sys_clone+0x300/0x300 [ 2102.735445][T27721] ? ksys_write+0x25f/0x2c0 [ 2102.739788][T27721] ? debug_smp_processor_id+0x17/0x20 [ 2102.744993][T27721] do_syscall_64+0x44/0xd0 [ 2102.749246][T27721] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2102.754980][T27721] RIP: 0033:0x7f8f8bc980c9 [ 2102.759230][T27721] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2102.778669][T27721] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 60) 07:19:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x4000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2102.786924][T27721] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2102.794723][T27721] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2102.802534][T27721] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2102.810357][T27721] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2102.818159][T27721] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2102.825972][T27721] [ 2102.919239][T27736] FAULT_INJECTION: forcing a failure. [ 2102.919239][T27736] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2102.932508][T27736] CPU: 0 PID: 27736 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2102.942579][T27736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2102.952474][T27736] Call Trace: [ 2102.955592][T27736] [ 2102.958370][T27736] dump_stack_lvl+0x151/0x1b7 [ 2102.962890][T27736] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2102.968184][T27736] dump_stack+0x15/0x17 [ 2102.972178][T27736] should_fail+0x3c0/0x510 [ 2102.976426][T27736] should_fail_alloc_page+0x58/0x70 [ 2102.981461][T27736] __alloc_pages+0x1de/0x7c0 [ 2102.985891][T27736] ? __count_vm_events+0x30/0x30 [ 2102.990662][T27736] pte_alloc_one+0x73/0x1b0 [ 2102.994999][T27736] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2103.000118][T27736] __pte_alloc+0x86/0x350 [ 2103.004284][T27736] ? free_pgtables+0x210/0x210 [ 2103.008884][T27736] ? _raw_spin_lock+0xa3/0x1b0 [ 2103.013570][T27736] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2103.018783][T27736] ? unwind_get_return_address+0x4c/0x90 [ 2103.024247][T27736] copy_pte_range+0x1b1f/0x20b0 [ 2103.028935][T27736] ? stack_trace_save+0x12d/0x1f0 [ 2103.033793][T27736] ? anon_vma_clone+0xa1/0x4f0 [ 2103.038395][T27736] ? __kunmap_atomic+0x80/0x80 [ 2103.042992][T27736] ? dup_mmap+0x750/0xea0 [ 2103.047161][T27736] ? dup_mm+0x91/0x330 [ 2103.051064][T27736] ? copy_mm+0x108/0x1b0 [ 2103.055144][T27736] ? copy_process+0x1295/0x3250 [ 2103.059830][T27736] ? kernel_clone+0x22d/0x990 [ 2103.064346][T27736] ? __x64_sys_clone3+0x375/0x3a0 [ 2103.069207][T27736] ? do_syscall_64+0x44/0xd0 [ 2103.073630][T27736] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2103.079537][T27736] copy_page_range+0xc1e/0x1090 [ 2103.084226][T27736] ? pfn_valid+0x1e0/0x1e0 [ 2103.088477][T27736] dup_mmap+0x99f/0xea0 [ 2103.092467][T27736] ? __delayed_free_task+0x20/0x20 [ 2103.097416][T27736] ? mm_init+0x807/0x960 [ 2103.101493][T27736] dup_mm+0x91/0x330 [ 2103.105227][T27736] copy_mm+0x108/0x1b0 [ 2103.109133][T27736] copy_process+0x1295/0x3250 [ 2103.113649][T27736] ? check_stack_object+0xf7/0x130 [ 2103.118594][T27736] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2103.123539][T27736] ? copy_clone_args_from_user+0x6cf/0x790 [ 2103.129183][T27736] kernel_clone+0x22d/0x990 [ 2103.133521][T27736] ? dup_mmap+0xea0/0xea0 [ 2103.137686][T27736] ? create_io_thread+0x1e0/0x1e0 [ 2103.142549][T27736] ? file_end_write+0x1b0/0x1b0 [ 2103.147235][T27736] __x64_sys_clone3+0x375/0x3a0 [ 2103.151921][T27736] ? __ia32_sys_clone+0x300/0x300 [ 2103.156785][T27736] ? ksys_write+0x25f/0x2c0 [ 2103.161123][T27736] ? debug_smp_processor_id+0x17/0x20 [ 2103.166328][T27736] do_syscall_64+0x44/0xd0 [ 2103.170599][T27736] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2103.176311][T27736] RIP: 0033:0x7f8f8bc980c9 [ 2103.180566][T27736] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2103.200105][T27736] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2103.208352][T27736] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 07:19:18 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x930e0000}, 0x0) 07:19:18 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000000000000000000000008500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x7000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0xffffff7f) 07:19:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 61) [ 2103.216161][T27736] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2103.223977][T27736] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2103.231806][T27736] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2103.239594][T27736] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2103.247410][T27736] 07:19:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x10fff}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2103.357456][T27754] FAULT_INJECTION: forcing a failure. [ 2103.357456][T27754] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2103.371259][T27754] CPU: 1 PID: 27754 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2103.381328][T27754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2103.391228][T27754] Call Trace: [ 2103.394352][T27754] [ 2103.397125][T27754] dump_stack_lvl+0x151/0x1b7 [ 2103.401641][T27754] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2103.406935][T27754] dump_stack+0x15/0x17 [ 2103.410924][T27754] should_fail+0x3c0/0x510 [ 2103.415179][T27754] should_fail_alloc_page+0x58/0x70 [ 2103.420213][T27754] __alloc_pages+0x1de/0x7c0 [ 2103.424638][T27754] ? __count_vm_events+0x30/0x30 [ 2103.429416][T27754] pte_alloc_one+0x73/0x1b0 [ 2103.433755][T27754] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2103.438792][T27754] __pte_alloc+0x86/0x350 [ 2103.442954][T27754] ? free_pgtables+0x210/0x210 [ 2103.447552][T27754] ? _raw_spin_lock+0xa3/0x1b0 [ 2103.452150][T27754] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2103.457361][T27754] ? unwind_get_return_address+0x4c/0x90 [ 2103.462828][T27754] copy_pte_range+0x1b1f/0x20b0 [ 2103.467517][T27754] ? stack_trace_save+0x12d/0x1f0 [ 2103.472496][T27754] ? anon_vma_clone+0xa1/0x4f0 [ 2103.477086][T27754] ? __kunmap_atomic+0x80/0x80 [ 2103.481686][T27754] ? dup_mmap+0x750/0xea0 [ 2103.485850][T27754] ? dup_mm+0x91/0x330 [ 2103.489756][T27754] ? copy_mm+0x108/0x1b0 [ 2103.493832][T27754] ? copy_process+0x1295/0x3250 [ 2103.498524][T27754] ? kernel_clone+0x22d/0x990 [ 2103.503038][T27754] ? __x64_sys_clone3+0x375/0x3a0 [ 2103.507894][T27754] ? do_syscall_64+0x44/0xd0 [ 2103.512326][T27754] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2103.518230][T27754] copy_page_range+0xc1e/0x1090 [ 2103.522916][T27754] ? pfn_valid+0x1e0/0x1e0 [ 2103.527175][T27754] dup_mmap+0x99f/0xea0 [ 2103.531158][T27754] ? __delayed_free_task+0x20/0x20 [ 2103.536107][T27754] ? mm_init+0x807/0x960 [ 2103.540182][T27754] dup_mm+0x91/0x330 [ 2103.543919][T27754] copy_mm+0x108/0x1b0 [ 2103.547826][T27754] copy_process+0x1295/0x3250 [ 2103.552336][T27754] ? check_stack_object+0xf7/0x130 [ 2103.557285][T27754] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2103.562230][T27754] ? copy_clone_args_from_user+0x6cf/0x790 [ 2103.567872][T27754] kernel_clone+0x22d/0x990 [ 2103.572212][T27754] ? dup_mmap+0xea0/0xea0 [ 2103.576376][T27754] ? create_io_thread+0x1e0/0x1e0 [ 2103.581266][T27754] ? file_end_write+0x1b0/0x1b0 [ 2103.585926][T27754] __x64_sys_clone3+0x375/0x3a0 [ 2103.590610][T27754] ? __ia32_sys_clone+0x300/0x300 [ 2103.595472][T27754] ? ksys_write+0x25f/0x2c0 [ 2103.599813][T27754] ? debug_smp_processor_id+0x17/0x20 [ 2103.605023][T27754] do_syscall_64+0x44/0xd0 [ 2103.609274][T27754] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2103.614999][T27754] RIP: 0033:0x7f8f8bc980c9 [ 2103.619252][T27754] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2103.638696][T27754] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2103.646942][T27754] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 07:19:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0xf800) 07:19:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x20010}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 62) [ 2103.654754][T27754] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2103.662566][T27754] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2103.670375][T27754] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2103.678193][T27754] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2103.686003][T27754] 07:19:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x20200}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2103.805134][T27772] FAULT_INJECTION: forcing a failure. [ 2103.805134][T27772] name failslab, interval 1, probability 0, space 0, times 0 07:19:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x80000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2103.879341][T27772] CPU: 0 PID: 27772 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2103.889412][T27772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2103.899305][T27772] Call Trace: [ 2103.902425][T27772] [ 2103.905202][T27772] dump_stack_lvl+0x151/0x1b7 [ 2103.909723][T27772] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2103.915016][T27772] dump_stack+0x15/0x17 [ 2103.919005][T27772] should_fail+0x3c0/0x510 [ 2103.923257][T27772] __should_failslab+0x9f/0xe0 [ 2103.927858][T27772] should_failslab+0x9/0x20 [ 2103.932200][T27772] kmem_cache_alloc+0x4f/0x2f0 [ 2103.936796][T27772] ? vm_area_dup+0x26/0x1d0 [ 2103.941138][T27772] vm_area_dup+0x26/0x1d0 [ 2103.945303][T27772] dup_mmap+0x6b8/0xea0 [ 2103.949296][T27772] ? __delayed_free_task+0x20/0x20 [ 2103.954244][T27772] ? mm_init+0x807/0x960 [ 2103.958320][T27772] dup_mm+0x91/0x330 [ 2103.962056][T27772] copy_mm+0x108/0x1b0 [ 2103.965960][T27772] copy_process+0x1295/0x3250 [ 2103.970475][T27772] ? check_stack_object+0xf7/0x130 [ 2103.975419][T27772] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2103.980368][T27772] ? copy_clone_args_from_user+0x6cf/0x790 [ 2103.986009][T27772] kernel_clone+0x22d/0x990 [ 2103.990347][T27772] ? dup_mmap+0xea0/0xea0 [ 2103.994514][T27772] ? create_io_thread+0x1e0/0x1e0 [ 2103.999376][T27772] ? file_end_write+0x1b0/0x1b0 [ 2104.004062][T27772] __x64_sys_clone3+0x375/0x3a0 [ 2104.008750][T27772] ? __ia32_sys_clone+0x300/0x300 [ 2104.013610][T27772] ? ksys_write+0x25f/0x2c0 [ 2104.017950][T27772] ? debug_smp_processor_id+0x17/0x20 [ 2104.023158][T27772] do_syscall_64+0x44/0xd0 [ 2104.027410][T27772] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2104.033139][T27772] RIP: 0033:0x7f8f8bc980c9 [ 2104.037394][T27772] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2104.056835][T27772] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2104.065079][T27772] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 07:19:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0xffffff9e) [ 2104.072889][T27772] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2104.080700][T27772] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2104.088510][T27772] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2104.096324][T27772] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2104.104138][T27772] 07:19:19 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 07:19:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x101000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000000000000000000000008500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 63) 07:19:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x700000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10002) 07:19:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10003) 07:19:19 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10004) [ 2104.269560][T27787] FAULT_INJECTION: forcing a failure. [ 2104.269560][T27787] name failslab, interval 1, probability 0, space 0, times 0 [ 2104.305325][T27787] CPU: 0 PID: 27787 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2104.315396][T27787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2104.325289][T27787] Call Trace: [ 2104.328413][T27787] [ 2104.331190][T27787] dump_stack_lvl+0x151/0x1b7 [ 2104.335719][T27787] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2104.341001][T27787] dump_stack+0x15/0x17 [ 2104.344989][T27787] should_fail+0x3c0/0x510 [ 2104.349329][T27787] __should_failslab+0x9f/0xe0 [ 2104.353929][T27787] should_failslab+0x9/0x20 [ 2104.358269][T27787] kmem_cache_alloc+0x4f/0x2f0 [ 2104.362870][T27787] ? vm_area_dup+0x26/0x1d0 [ 2104.367210][T27787] vm_area_dup+0x26/0x1d0 [ 2104.371377][T27787] dup_mmap+0x6b8/0xea0 [ 2104.375369][T27787] ? __delayed_free_task+0x20/0x20 [ 2104.380315][T27787] ? mm_init+0x807/0x960 [ 2104.384401][T27787] dup_mm+0x91/0x330 [ 2104.388126][T27787] copy_mm+0x108/0x1b0 [ 2104.392033][T27787] copy_process+0x1295/0x3250 [ 2104.396549][T27787] ? check_stack_object+0xf7/0x130 [ 2104.401491][T27787] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2104.406438][T27787] ? copy_clone_args_from_user+0x6cf/0x790 [ 2104.412083][T27787] kernel_clone+0x22d/0x990 [ 2104.416421][T27787] ? dup_mmap+0xea0/0xea0 [ 2104.420589][T27787] ? create_io_thread+0x1e0/0x1e0 [ 2104.425448][T27787] ? file_end_write+0x1b0/0x1b0 [ 2104.430161][T27787] __x64_sys_clone3+0x375/0x3a0 [ 2104.434834][T27787] ? __ia32_sys_clone+0x300/0x300 [ 2104.439686][T27787] ? ksys_write+0x25f/0x2c0 [ 2104.444025][T27787] ? debug_smp_processor_id+0x17/0x20 [ 2104.449234][T27787] do_syscall_64+0x44/0xd0 [ 2104.453485][T27787] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2104.459217][T27787] RIP: 0033:0x7f8f8bc980c9 [ 2104.463463][T27787] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2104.482993][T27787] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2104.491237][T27787] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2104.499049][T27787] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2104.506862][T27787] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 07:19:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10005) 07:19:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0xf0ff1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2104.514674][T27787] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2104.523177][T27787] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2104.530991][T27787] 07:19:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x1000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0xffffffef) 07:19:20 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xefffffff}, 0x0) 07:19:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10006) 07:19:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 64) 07:19:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x2000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000000000000000000000008500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10007) 07:19:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10008) [ 2105.100319][T27818] FAULT_INJECTION: forcing a failure. [ 2105.100319][T27818] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.114858][T27818] CPU: 0 PID: 27818 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2105.124923][T27818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2105.134814][T27818] Call Trace: [ 2105.137937][T27818] [ 2105.140717][T27818] dump_stack_lvl+0x151/0x1b7 [ 2105.145228][T27818] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2105.150524][T27818] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2105.156772][T27818] dump_stack+0x15/0x17 [ 2105.160763][T27818] should_fail+0x3c0/0x510 [ 2105.165018][T27818] __should_failslab+0x9f/0xe0 [ 2105.169621][T27818] should_failslab+0x9/0x20 [ 2105.173965][T27818] kmem_cache_alloc+0x4f/0x2f0 [ 2105.178556][T27818] ? anon_vma_fork+0xf7/0x4f0 [ 2105.183069][T27818] anon_vma_fork+0xf7/0x4f0 [ 2105.187408][T27818] ? anon_vma_name+0x43/0x70 [ 2105.191836][T27818] dup_mmap+0x750/0xea0 [ 2105.195832][T27818] ? __delayed_free_task+0x20/0x20 [ 2105.200777][T27818] ? mm_init+0x807/0x960 [ 2105.204960][T27818] dup_mm+0x91/0x330 [ 2105.208674][T27818] copy_mm+0x108/0x1b0 [ 2105.212582][T27818] copy_process+0x1295/0x3250 [ 2105.217095][T27818] ? check_stack_object+0xf7/0x130 [ 2105.222044][T27818] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2105.226989][T27818] ? copy_clone_args_from_user+0x6cf/0x790 [ 2105.232629][T27818] kernel_clone+0x22d/0x990 [ 2105.236969][T27818] ? dup_mmap+0xea0/0xea0 [ 2105.241146][T27818] ? create_io_thread+0x1e0/0x1e0 [ 2105.246005][T27818] ? file_end_write+0x1b0/0x1b0 [ 2105.250686][T27818] __x64_sys_clone3+0x375/0x3a0 [ 2105.255371][T27818] ? __ia32_sys_clone+0x300/0x300 [ 2105.260230][T27818] ? ksys_write+0x25f/0x2c0 [ 2105.264580][T27818] ? debug_smp_processor_id+0x17/0x20 [ 2105.269784][T27818] do_syscall_64+0x44/0xd0 [ 2105.274038][T27818] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2105.279761][T27818] RIP: 0033:0x7f8f8bc980c9 [ 2105.284015][T27818] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2105.303454][T27818] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2105.311697][T27818] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2105.319512][T27818] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2105.327321][T27818] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2105.335136][T27818] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2105.342943][T27818] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 07:19:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x7000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:20 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10009) [ 2105.350771][T27818] 07:19:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 65) 07:19:21 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1000a) [ 2105.489002][T27844] FAULT_INJECTION: forcing a failure. [ 2105.489002][T27844] name failslab, interval 1, probability 0, space 0, times 0 [ 2105.516649][T27844] CPU: 1 PID: 27844 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2105.526720][T27844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2105.536616][T27844] Call Trace: [ 2105.539744][T27844] [ 2105.542520][T27844] dump_stack_lvl+0x151/0x1b7 [ 2105.547041][T27844] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2105.552327][T27844] dump_stack+0x15/0x17 [ 2105.556321][T27844] should_fail+0x3c0/0x510 [ 2105.560574][T27844] __should_failslab+0x9f/0xe0 [ 2105.565182][T27844] should_failslab+0x9/0x20 [ 2105.569513][T27844] kmem_cache_alloc+0x4f/0x2f0 [ 2105.574114][T27844] ? anon_vma_fork+0x1b9/0x4f0 [ 2105.578715][T27844] anon_vma_fork+0x1b9/0x4f0 [ 2105.583139][T27844] dup_mmap+0x750/0xea0 [ 2105.587131][T27844] ? __delayed_free_task+0x20/0x20 [ 2105.592081][T27844] ? mm_init+0x807/0x960 [ 2105.596170][T27844] dup_mm+0x91/0x330 [ 2105.599888][T27844] copy_mm+0x108/0x1b0 [ 2105.603800][T27844] copy_process+0x1295/0x3250 [ 2105.608313][T27844] ? check_stack_object+0xf7/0x130 [ 2105.613261][T27844] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2105.618202][T27844] ? copy_clone_args_from_user+0x6cf/0x790 [ 2105.623848][T27844] kernel_clone+0x22d/0x990 [ 2105.628184][T27844] ? dup_mmap+0xea0/0xea0 [ 2105.632351][T27844] ? create_io_thread+0x1e0/0x1e0 [ 2105.637216][T27844] ? file_end_write+0x1b0/0x1b0 [ 2105.641899][T27844] __x64_sys_clone3+0x375/0x3a0 [ 2105.646586][T27844] ? __ia32_sys_clone+0x300/0x300 [ 2105.651445][T27844] ? ksys_write+0x25f/0x2c0 [ 2105.655791][T27844] ? debug_smp_processor_id+0x17/0x20 [ 2105.660995][T27844] do_syscall_64+0x44/0xd0 [ 2105.665247][T27844] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2105.670975][T27844] RIP: 0033:0x7f8f8bc980c9 [ 2105.675241][T27844] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2105.694670][T27844] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2105.702916][T27844] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2105.710725][T27844] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2105.718538][T27844] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2105.726351][T27844] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2105.734158][T27844] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2105.741975][T27844] 07:19:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0xfffffff0) 07:19:21 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 07:19:21 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1000b) 07:19:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x8000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 66) 07:19:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:21 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1000c) 07:19:21 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1000d) [ 2105.988460][T27856] FAULT_INJECTION: forcing a failure. [ 2105.988460][T27856] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2106.001926][T27856] CPU: 0 PID: 27856 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2106.011993][T27856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2106.021884][T27856] Call Trace: [ 2106.025007][T27856] [ 2106.027787][T27856] dump_stack_lvl+0x151/0x1b7 [ 2106.032308][T27856] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2106.037593][T27856] dump_stack+0x15/0x17 [ 2106.041586][T27856] should_fail+0x3c0/0x510 [ 2106.045928][T27856] should_fail_alloc_page+0x58/0x70 [ 2106.051218][T27856] __alloc_pages+0x1de/0x7c0 [ 2106.055649][T27856] ? __count_vm_events+0x30/0x30 [ 2106.060425][T27856] pte_alloc_one+0x73/0x1b0 [ 2106.064759][T27856] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2106.069802][T27856] __pte_alloc+0x86/0x350 [ 2106.073959][T27856] ? free_pgtables+0x210/0x210 [ 2106.078558][T27856] ? __kernel_text_address+0x9a/0x110 [ 2106.083769][T27856] ? unwind_get_return_address+0x4c/0x90 [ 2106.089236][T27856] copy_pte_range+0x1b1f/0x20b0 [ 2106.093922][T27856] ? stack_trace_save+0x12d/0x1f0 [ 2106.098785][T27856] ? anon_vma_clone+0xa1/0x4f0 [ 2106.103381][T27856] ? __kunmap_atomic+0x80/0x80 [ 2106.107982][T27856] ? dup_mmap+0x750/0xea0 [ 2106.112149][T27856] ? dup_mm+0x91/0x330 [ 2106.116055][T27856] ? copy_mm+0x108/0x1b0 [ 2106.120141][T27856] ? copy_process+0x1295/0x3250 [ 2106.124822][T27856] ? kernel_clone+0x22d/0x990 [ 2106.129421][T27856] ? __x64_sys_clone3+0x375/0x3a0 [ 2106.134279][T27856] ? do_syscall_64+0x44/0xd0 [ 2106.138709][T27856] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2106.144612][T27856] copy_page_range+0xc1e/0x1090 [ 2106.149301][T27856] ? pfn_valid+0x1e0/0x1e0 [ 2106.153551][T27856] dup_mmap+0x99f/0xea0 [ 2106.157544][T27856] ? __delayed_free_task+0x20/0x20 [ 2106.162488][T27856] ? mm_init+0x807/0x960 [ 2106.166569][T27856] dup_mm+0x91/0x330 [ 2106.170302][T27856] copy_mm+0x108/0x1b0 [ 2106.174301][T27856] copy_process+0x1295/0x3250 [ 2106.178816][T27856] ? check_stack_object+0xf7/0x130 [ 2106.183757][T27856] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2106.188702][T27856] ? copy_clone_args_from_user+0x6cf/0x790 [ 2106.194344][T27856] kernel_clone+0x22d/0x990 [ 2106.198692][T27856] ? dup_mmap+0xea0/0xea0 [ 2106.202854][T27856] ? create_io_thread+0x1e0/0x1e0 [ 2106.207710][T27856] ? file_end_write+0x1b0/0x1b0 [ 2106.212405][T27856] __x64_sys_clone3+0x375/0x3a0 [ 2106.217084][T27856] ? __ia32_sys_clone+0x300/0x300 [ 2106.221956][T27856] ? ksys_write+0x25f/0x2c0 [ 2106.226295][T27856] ? debug_smp_processor_id+0x17/0x20 [ 2106.231493][T27856] do_syscall_64+0x44/0xd0 [ 2106.235745][T27856] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2106.241471][T27856] RIP: 0033:0x7f8f8bc980c9 [ 2106.245723][T27856] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2106.265168][T27856] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2106.273410][T27856] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2106.281223][T27856] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 07:19:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 67) 07:19:21 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1000e) 07:19:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x9000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2106.289034][T27856] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2106.296845][T27856] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2106.304656][T27856] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2106.312471][T27856] 07:19:21 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1000f) [ 2106.412182][T27881] FAULT_INJECTION: forcing a failure. [ 2106.412182][T27881] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.444242][T27881] CPU: 0 PID: 27881 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2106.454318][T27881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2106.464207][T27881] Call Trace: [ 2106.467332][T27881] [ 2106.470108][T27881] dump_stack_lvl+0x151/0x1b7 [ 2106.474628][T27881] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2106.479928][T27881] ? do_syscall_64+0x44/0xd0 [ 2106.484359][T27881] dump_stack+0x15/0x17 [ 2106.488336][T27881] should_fail+0x3c0/0x510 [ 2106.492598][T27881] __should_failslab+0x9f/0xe0 [ 2106.497186][T27881] should_failslab+0x9/0x20 [ 2106.501531][T27881] kmem_cache_alloc+0x4f/0x2f0 [ 2106.506149][T27881] ? anon_vma_clone+0xa1/0x4f0 [ 2106.510733][T27881] anon_vma_clone+0xa1/0x4f0 [ 2106.515157][T27881] anon_vma_fork+0x91/0x4f0 [ 2106.519686][T27881] ? anon_vma_name+0x43/0x70 [ 2106.524096][T27881] dup_mmap+0x750/0xea0 [ 2106.528085][T27881] ? __delayed_free_task+0x20/0x20 [ 2106.533041][T27881] ? mm_init+0x807/0x960 [ 2106.537111][T27881] dup_mm+0x91/0x330 [ 2106.540846][T27881] copy_mm+0x108/0x1b0 [ 2106.544750][T27881] copy_process+0x1295/0x3250 [ 2106.549265][T27881] ? check_stack_object+0xf7/0x130 [ 2106.554214][T27881] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2106.559156][T27881] ? copy_clone_args_from_user+0x6cf/0x790 [ 2106.564801][T27881] kernel_clone+0x22d/0x990 [ 2106.569140][T27881] ? dup_mmap+0xea0/0xea0 [ 2106.573303][T27881] ? create_io_thread+0x1e0/0x1e0 [ 2106.578165][T27881] ? file_end_write+0x1b0/0x1b0 [ 2106.582852][T27881] __x64_sys_clone3+0x375/0x3a0 [ 2106.587540][T27881] ? __ia32_sys_clone+0x300/0x300 [ 2106.592401][T27881] ? ksys_write+0x25f/0x2c0 [ 2106.596741][T27881] ? debug_smp_processor_id+0x17/0x20 [ 2106.601947][T27881] do_syscall_64+0x44/0xd0 [ 2106.606199][T27881] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2106.611928][T27881] RIP: 0033:0x7f8f8bc980c9 [ 2106.616184][T27881] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2106.635624][T27881] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2106.643868][T27881] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2106.651681][T27881] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 07:19:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x80030000000000) [ 2106.659494][T27881] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2106.667302][T27881] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2106.675114][T27881] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2106.682929][T27881] 07:19:22 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 07:19:22 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10010) 07:19:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 68) 07:19:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x10000200}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:22 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:22 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10011) 07:19:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x11000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:22 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10013) 07:19:22 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10015) [ 2106.959833][T27910] FAULT_INJECTION: forcing a failure. [ 2106.959833][T27910] name failslab, interval 1, probability 0, space 0, times 0 [ 2106.990097][T27910] CPU: 1 PID: 27910 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2107.000173][T27910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2107.010072][T27910] Call Trace: [ 2107.013191][T27910] [ 2107.015969][T27910] dump_stack_lvl+0x151/0x1b7 [ 2107.020501][T27910] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2107.025904][T27910] dump_stack+0x15/0x17 [ 2107.029892][T27910] should_fail+0x3c0/0x510 [ 2107.034140][T27910] __should_failslab+0x9f/0xe0 [ 2107.038742][T27910] should_failslab+0x9/0x20 [ 2107.043081][T27910] kmem_cache_alloc+0x4f/0x2f0 [ 2107.047678][T27910] ? vm_area_dup+0x26/0x1d0 [ 2107.052023][T27910] vm_area_dup+0x26/0x1d0 [ 2107.056189][T27910] dup_mmap+0x6b8/0xea0 [ 2107.060181][T27910] ? __delayed_free_task+0x20/0x20 [ 2107.065127][T27910] ? mm_init+0x807/0x960 [ 2107.069204][T27910] dup_mm+0x91/0x330 [ 2107.072937][T27910] copy_mm+0x108/0x1b0 [ 2107.076858][T27910] copy_process+0x1295/0x3250 [ 2107.081358][T27910] ? check_stack_object+0xf7/0x130 [ 2107.086305][T27910] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2107.091249][T27910] ? copy_clone_args_from_user+0x6cf/0x790 [ 2107.096896][T27910] kernel_clone+0x22d/0x990 [ 2107.101230][T27910] ? dup_mmap+0xea0/0xea0 [ 2107.105396][T27910] ? create_io_thread+0x1e0/0x1e0 [ 2107.110353][T27910] ? file_end_write+0x1b0/0x1b0 [ 2107.115128][T27910] __x64_sys_clone3+0x375/0x3a0 [ 2107.119817][T27910] ? __ia32_sys_clone+0x300/0x300 [ 2107.124676][T27910] ? ksys_write+0x25f/0x2c0 [ 2107.129025][T27910] ? debug_smp_processor_id+0x17/0x20 [ 2107.134221][T27910] do_syscall_64+0x44/0xd0 [ 2107.138475][T27910] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2107.144208][T27910] RIP: 0033:0x7f8f8bc980c9 [ 2107.148472][T27910] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2107.167899][T27910] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2107.176142][T27910] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2107.183956][T27910] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2107.191770][T27910] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2107.199588][T27910] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 07:19:22 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10017) 07:19:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x14ae02a0}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2107.207390][T27910] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2107.215207][T27910] 07:19:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x100000000000000) 07:19:23 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 07:19:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10019) 07:19:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 69) 07:19:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x1f000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1001c) 07:19:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10021) 07:19:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10022) 07:19:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x1ffff000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2107.798959][T27942] FAULT_INJECTION: forcing a failure. [ 2107.798959][T27942] name failslab, interval 1, probability 0, space 0, times 0 [ 2107.836984][T27942] CPU: 0 PID: 27942 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2107.847055][T27942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2107.856956][T27942] Call Trace: [ 2107.860076][T27942] [ 2107.862851][T27942] dump_stack_lvl+0x151/0x1b7 [ 2107.867363][T27942] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2107.872662][T27942] dump_stack+0x15/0x17 [ 2107.876657][T27942] should_fail+0x3c0/0x510 [ 2107.880901][T27942] __should_failslab+0x9f/0xe0 [ 2107.885505][T27942] should_failslab+0x9/0x20 [ 2107.889845][T27942] kmem_cache_alloc+0x4f/0x2f0 [ 2107.894441][T27942] ? anon_vma_clone+0xa1/0x4f0 [ 2107.899043][T27942] anon_vma_clone+0xa1/0x4f0 [ 2107.903469][T27942] anon_vma_fork+0x91/0x4f0 [ 2107.907809][T27942] ? anon_vma_name+0x43/0x70 [ 2107.912238][T27942] dup_mmap+0x750/0xea0 [ 2107.916229][T27942] ? __delayed_free_task+0x20/0x20 [ 2107.921179][T27942] ? mm_init+0x807/0x960 [ 2107.925257][T27942] dup_mm+0x91/0x330 [ 2107.928990][T27942] copy_mm+0x108/0x1b0 [ 2107.932893][T27942] copy_process+0x1295/0x3250 [ 2107.937408][T27942] ? check_stack_object+0xf7/0x130 [ 2107.942355][T27942] ? pidfd_show_fdinfo+0x2b0/0x2b0 07:19:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x20000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2107.947307][T27942] ? copy_clone_args_from_user+0x6cf/0x790 [ 2107.952950][T27942] kernel_clone+0x22d/0x990 [ 2107.957288][T27942] ? dup_mmap+0xea0/0xea0 [ 2107.961450][T27942] ? create_io_thread+0x1e0/0x1e0 [ 2107.966308][T27942] ? file_end_write+0x1b0/0x1b0 [ 2107.970998][T27942] __x64_sys_clone3+0x375/0x3a0 [ 2107.975685][T27942] ? __ia32_sys_clone+0x300/0x300 [ 2107.980545][T27942] ? ksys_write+0x25f/0x2c0 [ 2107.984972][T27942] ? debug_smp_processor_id+0x17/0x20 [ 2107.990184][T27942] do_syscall_64+0x44/0xd0 [ 2107.994452][T27942] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2108.000189][T27942] RIP: 0033:0x7f8f8bc980c9 [ 2108.004413][T27942] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2108.023855][T27942] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2108.032101][T27942] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2108.039912][T27942] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 07:19:23 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10023) [ 2108.047721][T27942] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2108.055537][T27942] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2108.063347][T27942] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2108.071159][T27942] 07:19:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x200000000000000) 07:19:24 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffffef}, 0x0) 07:19:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 70) 07:19:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10025) 07:19:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0x40000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10027) 07:19:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10028) [ 2108.641031][T27966] FAULT_INJECTION: forcing a failure. [ 2108.641031][T27966] name failslab, interval 1, probability 0, space 0, times 0 [ 2108.654006][T27966] CPU: 1 PID: 27966 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2108.664068][T27966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2108.673959][T27966] Call Trace: [ 2108.677084][T27966] [ 2108.679860][T27966] dump_stack_lvl+0x151/0x1b7 [ 2108.684374][T27966] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2108.689672][T27966] dump_stack+0x15/0x17 [ 2108.693662][T27966] should_fail+0x3c0/0x510 [ 2108.697915][T27966] __should_failslab+0x9f/0xe0 [ 2108.702516][T27966] should_failslab+0x9/0x20 [ 2108.706852][T27966] kmem_cache_alloc+0x4f/0x2f0 [ 2108.711453][T27966] ? anon_vma_clone+0xa1/0x4f0 [ 2108.716054][T27966] anon_vma_clone+0xa1/0x4f0 [ 2108.720481][T27966] anon_vma_fork+0x91/0x4f0 [ 2108.724820][T27966] ? anon_vma_name+0x43/0x70 [ 2108.729247][T27966] dup_mmap+0x750/0xea0 [ 2108.733244][T27966] ? __delayed_free_task+0x20/0x20 [ 2108.738189][T27966] ? mm_init+0x807/0x960 [ 2108.742268][T27966] dup_mm+0x91/0x330 [ 2108.745997][T27966] copy_mm+0x108/0x1b0 [ 2108.749913][T27966] copy_process+0x1295/0x3250 [ 2108.754427][T27966] ? check_stack_object+0xf7/0x130 [ 2108.759365][T27966] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2108.764312][T27966] ? copy_clone_args_from_user+0x6cf/0x790 [ 2108.769986][T27966] kernel_clone+0x22d/0x990 [ 2108.774294][T27966] ? dup_mmap+0xea0/0xea0 [ 2108.778458][T27966] ? create_io_thread+0x1e0/0x1e0 [ 2108.783318][T27966] ? file_end_write+0x1b0/0x1b0 [ 2108.788007][T27966] __x64_sys_clone3+0x375/0x3a0 [ 2108.792693][T27966] ? __ia32_sys_clone+0x300/0x300 [ 2108.797553][T27966] ? ksys_write+0x25f/0x2c0 [ 2108.801894][T27966] ? debug_smp_processor_id+0x17/0x20 [ 2108.807103][T27966] do_syscall_64+0x44/0xd0 [ 2108.811359][T27966] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2108.817260][T27966] RIP: 0033:0x7f8f8bc980c9 [ 2108.821510][T27966] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 71) 07:19:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10029) [ 2108.840959][T27966] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2108.849195][T27966] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2108.857008][T27966] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2108.864819][T27966] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2108.872632][T27966] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2108.880442][T27966] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2108.888256][T27966] 07:19:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0xa002ae14}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1002a) [ 2108.980280][T27994] FAULT_INJECTION: forcing a failure. [ 2108.980280][T27994] name failslab, interval 1, probability 0, space 0, times 0 [ 2109.016729][T27994] CPU: 1 PID: 27994 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2109.027134][T27994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2109.037029][T27994] Call Trace: [ 2109.040153][T27994] [ 2109.042930][T27994] dump_stack_lvl+0x151/0x1b7 [ 2109.047453][T27994] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2109.052740][T27994] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2109.058990][T27994] dump_stack+0x15/0x17 [ 2109.062981][T27994] should_fail+0x3c0/0x510 [ 2109.067233][T27994] __should_failslab+0x9f/0xe0 [ 2109.071835][T27994] should_failslab+0x9/0x20 [ 2109.076174][T27994] kmem_cache_alloc+0x4f/0x2f0 [ 2109.080776][T27994] ? anon_vma_fork+0xf7/0x4f0 [ 2109.085289][T27994] anon_vma_fork+0xf7/0x4f0 [ 2109.089628][T27994] ? anon_vma_name+0x43/0x70 [ 2109.094064][T27994] dup_mmap+0x750/0xea0 [ 2109.098059][T27994] ? __delayed_free_task+0x20/0x20 [ 2109.102994][T27994] ? mm_init+0x807/0x960 [ 2109.107073][T27994] dup_mm+0x91/0x330 [ 2109.110806][T27994] copy_mm+0x108/0x1b0 [ 2109.114712][T27994] copy_process+0x1295/0x3250 [ 2109.120077][T27994] ? check_stack_object+0xf7/0x130 [ 2109.125013][T27994] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2109.129961][T27994] ? copy_clone_args_from_user+0x6cf/0x790 [ 2109.135605][T27994] kernel_clone+0x22d/0x990 [ 2109.139940][T27994] ? dup_mmap+0xea0/0xea0 [ 2109.144108][T27994] ? create_io_thread+0x1e0/0x1e0 [ 2109.148968][T27994] ? file_end_write+0x1b0/0x1b0 [ 2109.153656][T27994] __x64_sys_clone3+0x375/0x3a0 [ 2109.158342][T27994] ? __ia32_sys_clone+0x300/0x300 [ 2109.163210][T27994] ? ksys_write+0x25f/0x2c0 [ 2109.167545][T27994] ? debug_smp_processor_id+0x17/0x20 [ 2109.172751][T27994] do_syscall_64+0x44/0xd0 [ 2109.177003][T27994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2109.182729][T27994] RIP: 0033:0x7f8f8bc980c9 [ 2109.186988][T27994] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2109.206434][T27994] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2109.214670][T27994] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2109.222484][T27994] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 07:19:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1002c) [ 2109.230294][T27994] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2109.238106][T27994] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2109.245921][T27994] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2109.253730][T27994] [ 2109.309434][T27994] ================================================================== [ 2109.317324][T27994] BUG: KASAN: use-after-free in vm_area_free+0x7e/0x230 [ 2109.324092][T27994] Write of size 4 at addr ffff88812232b2a8 by task syz-executor.1/27994 [ 2109.332249][T27994] [ 2109.334427][T27994] CPU: 0 PID: 27994 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2109.344492][T27994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2109.354388][T27994] Call Trace: [ 2109.357508][T27994] [ 2109.360289][T27994] dump_stack_lvl+0x151/0x1b7 [ 2109.364804][T27994] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2109.370092][T27994] ? panic+0x727/0x727 [ 2109.373997][T27994] ? slab_free_freelist_hook+0xc9/0x1a0 [ 2109.379383][T27994] print_address_description+0x87/0x3d0 [ 2109.384762][T27994] kasan_report+0x1a6/0x1f0 [ 2109.389101][T27994] ? vm_area_free+0x7e/0x230 [ 2109.393526][T27994] ? vm_area_free+0x7e/0x230 [ 2109.397964][T27994] kasan_check_range+0x2aa/0x2e0 [ 2109.402733][T27994] __kasan_check_write+0x14/0x20 [ 2109.407502][T27994] vm_area_free+0x7e/0x230 [ 2109.411756][T27994] dup_mmap+0xbcd/0xea0 [ 2109.415749][T27994] ? __delayed_free_task+0x20/0x20 [ 2109.420816][T27994] ? mm_init+0x807/0x960 [ 2109.424893][T27994] dup_mm+0x91/0x330 [ 2109.428620][T27994] copy_mm+0x108/0x1b0 [ 2109.432523][T27994] copy_process+0x1295/0x3250 [ 2109.437038][T27994] ? check_stack_object+0xf7/0x130 [ 2109.441988][T27994] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2109.446930][T27994] ? copy_clone_args_from_user+0x6cf/0x790 [ 2109.452584][T27994] kernel_clone+0x22d/0x990 [ 2109.456915][T27994] ? dup_mmap+0xea0/0xea0 [ 2109.461086][T27994] ? create_io_thread+0x1e0/0x1e0 [ 2109.465939][T27994] ? file_end_write+0x1b0/0x1b0 [ 2109.470635][T27994] __x64_sys_clone3+0x375/0x3a0 [ 2109.475314][T27994] ? __ia32_sys_clone+0x300/0x300 [ 2109.480176][T27994] ? ksys_write+0x25f/0x2c0 [ 2109.484517][T27994] ? debug_smp_processor_id+0x17/0x20 [ 2109.489721][T27994] do_syscall_64+0x44/0xd0 [ 2109.493977][T27994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2109.499705][T27994] RIP: 0033:0x7f8f8bc980c9 [ 2109.503960][T27994] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2109.523403][T27994] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2109.531647][T27994] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2109.539456][T27994] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2109.547266][T27994] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2109.555171][T27994] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2109.563235][T27994] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2109.571050][T27994] [ 2109.573911][T27994] [ 2109.576090][T27994] Allocated by task 27966: [ 2109.580335][T27994] __kasan_slab_alloc+0xb2/0xe0 [ 2109.585019][T27994] kmem_cache_alloc+0x189/0x2f0 [ 2109.590747][T27994] vm_area_dup+0x26/0x1d0 [ 2109.594908][T27994] dup_mmap+0x6b8/0xea0 [ 2109.599336][T27994] dup_mm+0x91/0x330 [ 2109.603067][T27994] copy_mm+0x108/0x1b0 [ 2109.606975][T27994] copy_process+0x1295/0x3250 [ 2109.611487][T27994] kernel_clone+0x22d/0x990 [ 2109.615826][T27994] __x64_sys_clone3+0x375/0x3a0 [ 2109.620514][T27994] do_syscall_64+0x44/0xd0 [ 2109.624767][T27994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2109.630496][T27994] [ 2109.633472][T27994] Freed by task 27981: [ 2109.637355][T27994] kasan_set_track+0x4c/0x70 [ 2109.641778][T27994] kasan_set_free_info+0x23/0x40 [ 2109.646550][T27994] ____kasan_slab_free+0x126/0x160 [ 2109.651501][T27994] __kasan_slab_free+0x11/0x20 [ 2109.656098][T27994] slab_free_freelist_hook+0xc9/0x1a0 [ 2109.661309][T27994] kmem_cache_free+0x11a/0x2e0 [ 2109.665907][T27994] vm_area_free+0x1ae/0x230 [ 2109.670247][T27994] exit_mmap+0x5dd/0x7a0 [ 2109.674325][T27994] __mmput+0x95/0x300 [ 2109.678147][T27994] mmput+0x50/0x60 [ 2109.681705][T27994] exit_mm+0x50d/0x760 [ 2109.685611][T27994] do_exit+0x63c/0x24d0 [ 2109.689604][T27994] __ia32_sys_exit+0x0/0x40 [ 2109.693942][T27994] do_syscall_64+0x44/0xd0 [ 2109.698194][T27994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2109.703925][T27994] [ 2109.706093][T27994] Last potentially related work creation: [ 2109.711649][T27994] kasan_save_stack+0x3b/0x60 [ 2109.716161][T27994] __kasan_record_aux_stack+0xd3/0xf0 [ 2109.721370][T27994] kasan_record_aux_stack_noalloc+0xb/0x10 [ 2109.727010][T27994] call_rcu+0x140/0x1400 [ 2109.731089][T27994] vm_area_free+0x1e7/0x230 [ 2109.735429][T27994] __do_munmap+0x16ea/0x1ad0 [ 2109.739861][T27994] vm_munmap+0x14f/0x270 [ 2109.743936][T27994] __x86_set_memory_region+0x4cb/0x680 [ 2109.749232][T27994] kvm_arch_destroy_vm+0xa1/0x760 [ 2109.754092][T27994] kvm_put_kvm+0xa56/0x12d0 [ 2109.758440][T27994] kvm_vcpu_release+0x57/0x60 [ 2109.762943][T27994] __fput+0x3f9/0x910 [ 2109.766766][T27994] ____fput+0x15/0x20 [ 2109.770580][T27994] task_work_run+0x147/0x1b0 [ 2109.775009][T27994] exit_to_user_mode_loop+0xfd/0x110 [ 2109.780129][T27994] syscall_exit_to_user_mode+0x79/0xc0 [ 2109.785424][T27994] do_syscall_64+0x50/0xd0 [ 2109.789675][T27994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2109.795406][T27994] [ 2109.797574][T27994] The buggy address belongs to the object at ffff88812232b250 [ 2109.797574][T27994] which belongs to the cache vm_area_struct of size 232 [ 2109.811721][T27994] The buggy address is located 88 bytes inside of [ 2109.811721][T27994] 232-byte region [ffff88812232b250, ffff88812232b338) [ 2109.824743][T27994] The buggy address belongs to the page: [ 2109.830215][T27994] page:ffffea000488cac0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12232b [ 2109.840285][T27994] flags: 0x4000000000000200(slab|zone=1) [ 2109.845774][T27994] raw: 4000000000000200 0000000000000000 0000000100000001 ffff888100274d80 [ 2109.854171][T27994] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 2109.862584][T27994] page dumped because: kasan: bad access detected [ 2109.868836][T27994] page_owner tracks the page as allocated [ 2109.874389][T27994] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 545, ts 853929307599, free_ts 851320782212 [ 2109.890274][T27994] post_alloc_hook+0x1ab/0x1b0 [ 2109.894873][T27994] get_page_from_freelist+0x38b/0x400 [ 2109.900081][T27994] __alloc_pages+0x3a8/0x7c0 [ 2109.904504][T27994] allocate_slab+0x62/0x580 [ 2109.908848][T27994] ___slab_alloc+0x2e2/0x6f0 [ 2109.913273][T27994] __slab_alloc+0x4a/0x90 [ 2109.917438][T27994] kmem_cache_alloc+0x205/0x2f0 [ 2109.922128][T27994] vm_area_dup+0x26/0x1d0 [ 2109.926289][T27994] dup_mmap+0x6b8/0xea0 [ 2109.930281][T27994] dup_mm+0x91/0x330 [ 2109.934016][T27994] copy_mm+0x108/0x1b0 [ 2109.937920][T27994] copy_process+0x1295/0x3250 [ 2109.942433][T27994] kernel_clone+0x22d/0x990 [ 2109.946795][T27994] __x64_sys_clone+0x289/0x310 [ 2109.951375][T27994] do_syscall_64+0x44/0xd0 [ 2109.955628][T27994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2109.961386][T27994] page last free stack trace: [ 2109.965868][T27994] free_pcp_prepare+0x448/0x450 [ 2109.970555][T27994] free_unref_page+0x9c/0x370 [ 2109.975069][T27994] __free_pages+0xd8/0x100 [ 2109.979320][T27994] free_pages+0x7c/0x90 [ 2109.983315][T27994] mon_bin_release+0x144/0x200 [ 2109.987913][T27994] __fput+0x3f9/0x910 [ 2109.991736][T27994] ____fput+0x15/0x20 [ 2109.995552][T27994] task_work_run+0x147/0x1b0 [ 2109.999981][T27994] exit_to_user_mode_loop+0xfd/0x110 [ 2110.005101][T27994] syscall_exit_to_user_mode+0x79/0xc0 [ 2110.010395][T27994] do_syscall_64+0x50/0xd0 [ 2110.014648][T27994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2110.020379][T27994] [ 2110.022548][T27994] Memory state around the buggy address: [ 2110.028017][T27994] ffff88812232b180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 2110.035915][T27994] ffff88812232b200: 00 00 fc fc fc fc fc fc fc fc fa fb fb fb fb fb [ 2110.043813][T27994] >ffff88812232b280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2110.051729][T27994] ^ 07:19:25 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 07:19:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x300000000000000) 07:19:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0xf5ffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1002e) [ 2110.056922][T27994] ffff88812232b300: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fa [ 2110.064818][T27994] ffff88812232b380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2110.072713][T27994] ================================================================== [ 2110.080612][T27994] Disabling lock debugging due to kernel taint 07:19:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 72) 07:19:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1002f) 07:19:25 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10030) 07:19:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0xfbffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10031) [ 2110.241403][T28014] FAULT_INJECTION: forcing a failure. [ 2110.241403][T28014] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.255873][T28014] CPU: 1 PID: 28014 Comm: syz-executor.1 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2110.267341][T28014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2110.277228][T28014] Call Trace: [ 2110.280352][T28014] [ 2110.283125][T28014] dump_stack_lvl+0x151/0x1b7 [ 2110.287642][T28014] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2110.292937][T28014] dump_stack+0x15/0x17 [ 2110.297709][T28014] should_fail+0x3c0/0x510 [ 2110.301962][T28014] __should_failslab+0x9f/0xe0 [ 2110.306562][T28014] should_failslab+0x9/0x20 [ 2110.310907][T28014] kmem_cache_alloc+0x4f/0x2f0 [ 2110.315499][T28014] ? vm_area_dup+0x26/0x1d0 [ 2110.319844][T28014] vm_area_dup+0x26/0x1d0 [ 2110.324005][T28014] dup_mmap+0x6b8/0xea0 [ 2110.328002][T28014] ? __delayed_free_task+0x20/0x20 [ 2110.332944][T28014] ? mm_init+0x807/0x960 [ 2110.337024][T28014] dup_mm+0x91/0x330 [ 2110.340760][T28014] copy_mm+0x108/0x1b0 [ 2110.344923][T28014] copy_process+0x1295/0x3250 [ 2110.349445][T28014] ? check_stack_object+0xf7/0x130 [ 2110.354385][T28014] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2110.359331][T28014] ? copy_clone_args_from_user+0x6cf/0x790 [ 2110.364972][T28014] kernel_clone+0x22d/0x990 [ 2110.369314][T28014] ? dup_mmap+0xea0/0xea0 [ 2110.373478][T28014] ? create_io_thread+0x1e0/0x1e0 [ 2110.378341][T28014] ? file_end_write+0x1b0/0x1b0 [ 2110.383027][T28014] __x64_sys_clone3+0x375/0x3a0 [ 2110.387712][T28014] ? __ia32_sys_clone+0x300/0x300 [ 2110.392581][T28014] ? ksys_write+0x25f/0x2c0 [ 2110.396917][T28014] ? debug_smp_processor_id+0x17/0x20 [ 2110.402121][T28014] do_syscall_64+0x44/0xd0 [ 2110.406380][T28014] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2110.412102][T28014] RIP: 0033:0x7f8f8bc980c9 [ 2110.416357][T28014] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10032) 07:19:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 73) [ 2110.435804][T28014] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2110.444043][T28014] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2110.451857][T28014] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2110.459665][T28014] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2110.467476][T28014] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2110.476421][T28014] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2110.484230][T28014] [ 2110.595768][T28036] FAULT_INJECTION: forcing a failure. [ 2110.595768][T28036] name failslab, interval 1, probability 0, space 0, times 0 [ 2110.636686][T28036] CPU: 1 PID: 28036 Comm: syz-executor.1 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2110.648145][T28036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2110.658128][T28036] Call Trace: [ 2110.661250][T28036] [ 2110.664028][T28036] dump_stack_lvl+0x151/0x1b7 [ 2110.668541][T28036] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2110.673835][T28036] dump_stack+0x15/0x17 [ 2110.677826][T28036] should_fail+0x3c0/0x510 [ 2110.682081][T28036] __should_failslab+0x9f/0xe0 [ 2110.686682][T28036] should_failslab+0x9/0x20 [ 2110.691022][T28036] kmem_cache_alloc+0x4f/0x2f0 [ 2110.695620][T28036] ? vm_area_dup+0x26/0x1d0 [ 2110.699962][T28036] vm_area_dup+0x26/0x1d0 [ 2110.704127][T28036] dup_mmap+0x6b8/0xea0 [ 2110.708123][T28036] ? __delayed_free_task+0x20/0x20 [ 2110.713069][T28036] ? mm_init+0x807/0x960 [ 2110.717145][T28036] dup_mm+0x91/0x330 [ 2110.720881][T28036] copy_mm+0x108/0x1b0 [ 2110.724785][T28036] copy_process+0x1295/0x3250 [ 2110.729301][T28036] ? check_stack_object+0xf7/0x130 [ 2110.734245][T28036] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2110.739190][T28036] ? copy_clone_args_from_user+0x6cf/0x790 [ 2110.744834][T28036] kernel_clone+0x22d/0x990 [ 2110.749174][T28036] ? dup_mmap+0xea0/0xea0 [ 2110.753338][T28036] ? create_io_thread+0x1e0/0x1e0 [ 2110.758199][T28036] ? file_end_write+0x1b0/0x1b0 [ 2110.762888][T28036] __x64_sys_clone3+0x375/0x3a0 [ 2110.767573][T28036] ? __ia32_sys_clone+0x300/0x300 [ 2110.772433][T28036] ? ksys_write+0x25f/0x2c0 [ 2110.776773][T28036] ? debug_smp_processor_id+0x17/0x20 [ 2110.781980][T28036] do_syscall_64+0x44/0xd0 [ 2110.786238][T28036] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2110.791961][T28036] RIP: 0033:0x7f8f8bc980c9 [ 2110.796218][T28036] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2110.815658][T28036] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2110.823903][T28036] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2110.831712][T28036] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2110.839525][T28036] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2110.847337][T28036] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2110.855154][T28036] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2110.862963][T28036] 07:19:26 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x2) 07:19:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10034) 07:19:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0xff0f0100}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 74) 07:19:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x400000000000000) 07:19:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10035) 07:19:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0xfffffff5}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10036) [ 2111.029234][T28041] FAULT_INJECTION: forcing a failure. [ 2111.029234][T28041] name failslab, interval 1, probability 0, space 0, times 0 [ 2111.042123][T28041] CPU: 1 PID: 28041 Comm: syz-executor.1 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2111.053574][T28041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2111.063463][T28041] Call Trace: [ 2111.066586][T28041] [ 2111.069364][T28041] dump_stack_lvl+0x151/0x1b7 [ 2111.073879][T28041] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2111.079174][T28041] dump_stack+0x15/0x17 [ 2111.083175][T28041] should_fail+0x3c0/0x510 [ 2111.087420][T28041] __should_failslab+0x9f/0xe0 [ 2111.092018][T28041] should_failslab+0x9/0x20 [ 2111.096358][T28041] kmem_cache_alloc+0x4f/0x2f0 [ 2111.100956][T28041] ? vm_area_dup+0x26/0x1d0 [ 2111.105299][T28041] ? __kasan_check_read+0x11/0x20 [ 2111.110157][T28041] vm_area_dup+0x26/0x1d0 [ 2111.114328][T28041] dup_mmap+0x6b8/0xea0 [ 2111.118318][T28041] ? __delayed_free_task+0x20/0x20 [ 2111.123266][T28041] ? mm_init+0x807/0x960 [ 2111.127344][T28041] dup_mm+0x91/0x330 [ 2111.131075][T28041] copy_mm+0x108/0x1b0 [ 2111.134982][T28041] copy_process+0x1295/0x3250 [ 2111.139497][T28041] ? check_stack_object+0xf7/0x130 [ 2111.144442][T28041] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2111.149389][T28041] ? copy_clone_args_from_user+0x6cf/0x790 [ 2111.155032][T28041] kernel_clone+0x22d/0x990 [ 2111.159375][T28041] ? dup_mmap+0xea0/0xea0 [ 2111.163536][T28041] ? create_io_thread+0x1e0/0x1e0 [ 2111.168398][T28041] ? file_end_write+0x1b0/0x1b0 [ 2111.173083][T28041] __x64_sys_clone3+0x375/0x3a0 [ 2111.177774][T28041] ? __ia32_sys_clone+0x300/0x300 [ 2111.182633][T28041] ? ksys_write+0x25f/0x2c0 [ 2111.186976][T28041] ? debug_smp_processor_id+0x17/0x20 [ 2111.192178][T28041] do_syscall_64+0x44/0xd0 [ 2111.196436][T28041] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2111.202159][T28041] RIP: 0033:0x7f8f8bc980c9 [ 2111.206414][T28041] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:19:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10037) 07:19:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 75) [ 2111.225863][T28041] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2111.234104][T28041] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2111.241921][T28041] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2111.249812][T28041] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2111.257535][T28041] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2111.265348][T28041] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2111.273167][T28041] 07:19:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0xfffffffb}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2111.383485][T28072] FAULT_INJECTION: forcing a failure. [ 2111.383485][T28072] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2111.396958][T28072] CPU: 1 PID: 28072 Comm: syz-executor.1 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2111.408409][T28072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2111.418301][T28072] Call Trace: [ 2111.421426][T28072] [ 2111.424201][T28072] dump_stack_lvl+0x151/0x1b7 [ 2111.428714][T28072] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2111.434015][T28072] dump_stack+0x15/0x17 [ 2111.438005][T28072] should_fail+0x3c0/0x510 [ 2111.442255][T28072] should_fail_alloc_page+0x58/0x70 [ 2111.447289][T28072] __alloc_pages+0x1de/0x7c0 [ 2111.451715][T28072] ? __count_vm_events+0x30/0x30 [ 2111.456490][T28072] ? __this_cpu_preempt_check+0x13/0x20 [ 2111.462140][T28072] ? __mod_node_page_state+0xac/0xf0 [ 2111.467263][T28072] pte_alloc_one+0x73/0x1b0 [ 2111.471604][T28072] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2111.476636][T28072] __pte_alloc+0x86/0x350 [ 2111.480800][T28072] ? free_pgtables+0x210/0x210 [ 2111.485403][T28072] ? _raw_spin_lock+0xa3/0x1b0 [ 2111.490000][T28072] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2111.495210][T28072] ? __kernel_text_address+0x9a/0x110 [ 2111.500416][T28072] copy_pte_range+0x1b1f/0x20b0 [ 2111.505110][T28072] ? __kunmap_atomic+0x80/0x80 [ 2111.509824][T28072] ? __kasan_slab_alloc+0xc4/0xe0 [ 2111.514680][T28072] ? __kasan_slab_alloc+0xb2/0xe0 [ 2111.519550][T28072] ? kmem_cache_alloc+0x189/0x2f0 [ 2111.524401][T28072] ? vm_area_dup+0x26/0x1d0 [ 2111.528741][T28072] ? dup_mmap+0x6b8/0xea0 [ 2111.532906][T28072] ? dup_mm+0x91/0x330 [ 2111.536811][T28072] ? copy_mm+0x108/0x1b0 [ 2111.540891][T28072] ? copy_process+0x1295/0x3250 [ 2111.545577][T28072] ? kernel_clone+0x22d/0x990 [ 2111.550090][T28072] ? __x64_sys_clone3+0x375/0x3a0 [ 2111.554950][T28072] ? do_syscall_64+0x44/0xd0 [ 2111.559376][T28072] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2111.565283][T28072] copy_page_range+0xc1e/0x1090 [ 2111.569970][T28072] ? pfn_valid+0x1e0/0x1e0 [ 2111.574222][T28072] dup_mmap+0x99f/0xea0 [ 2111.578214][T28072] ? __delayed_free_task+0x20/0x20 [ 2111.583595][T28072] ? mm_init+0x807/0x960 [ 2111.587674][T28072] dup_mm+0x91/0x330 [ 2111.591406][T28072] copy_mm+0x108/0x1b0 [ 2111.595312][T28072] copy_process+0x1295/0x3250 [ 2111.599826][T28072] ? check_stack_object+0xf7/0x130 [ 2111.604771][T28072] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2111.609723][T28072] ? copy_clone_args_from_user+0x6cf/0x790 [ 2111.615369][T28072] kernel_clone+0x22d/0x990 [ 2111.619699][T28072] ? dup_mmap+0xea0/0xea0 [ 2111.623866][T28072] ? create_io_thread+0x1e0/0x1e0 [ 2111.628728][T28072] ? file_end_write+0x1b0/0x1b0 [ 2111.633412][T28072] __x64_sys_clone3+0x375/0x3a0 [ 2111.638103][T28072] ? __ia32_sys_clone+0x300/0x300 [ 2111.642964][T28072] ? ksys_write+0x25f/0x2c0 [ 2111.647301][T28072] ? debug_smp_processor_id+0x17/0x20 [ 2111.652508][T28072] do_syscall_64+0x44/0xd0 [ 2111.656770][T28072] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2111.662490][T28072] RIP: 0033:0x7f8f8bc980c9 [ 2111.666744][T28072] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2111.686188][T28072] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2111.694433][T28072] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2111.702240][T28072] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2111.710056][T28072] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2111.717864][T28072] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2111.725676][T28072] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2111.733488][T28072] 07:19:27 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x3) 07:19:27 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10038) 07:19:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {0xffffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58) 07:19:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x500000000000000) 07:19:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 76) 07:19:27 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10039) 07:19:27 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1003a) 07:19:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2, 0x0, 0x0}, 0x58) 07:19:27 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1003b) [ 2111.975567][T28089] FAULT_INJECTION: forcing a failure. [ 2111.975567][T28089] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.007114][T28089] CPU: 1 PID: 28089 Comm: syz-executor.1 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2112.018582][T28089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2112.028474][T28089] Call Trace: [ 2112.031609][T28089] [ 2112.034375][T28089] dump_stack_lvl+0x151/0x1b7 [ 2112.038890][T28089] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2112.044204][T28089] dump_stack+0x15/0x17 [ 2112.048176][T28089] should_fail+0x3c0/0x510 [ 2112.052433][T28089] __should_failslab+0x9f/0xe0 [ 2112.057027][T28089] should_failslab+0x9/0x20 [ 2112.061368][T28089] kmem_cache_alloc+0x4f/0x2f0 [ 2112.065966][T28089] ? anon_vma_clone+0xa1/0x4f0 [ 2112.070571][T28089] anon_vma_clone+0xa1/0x4f0 [ 2112.074994][T28089] anon_vma_fork+0x91/0x4f0 [ 2112.079333][T28089] ? anon_vma_name+0x4c/0x70 [ 2112.084194][T28089] dup_mmap+0x750/0xea0 [ 2112.088189][T28089] ? __delayed_free_task+0x20/0x20 [ 2112.093135][T28089] ? mm_init+0x807/0x960 [ 2112.097219][T28089] dup_mm+0x91/0x330 [ 2112.100949][T28089] copy_mm+0x108/0x1b0 [ 2112.104854][T28089] copy_process+0x1295/0x3250 [ 2112.109367][T28089] ? check_stack_object+0xf7/0x130 [ 2112.114399][T28089] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2112.119344][T28089] ? copy_clone_args_from_user+0x6cf/0x790 [ 2112.124989][T28089] kernel_clone+0x22d/0x990 [ 2112.131323][T28089] ? dup_mmap+0xea0/0xea0 [ 2112.135492][T28089] ? create_io_thread+0x1e0/0x1e0 [ 2112.140352][T28089] ? file_end_write+0x1b0/0x1b0 [ 2112.145040][T28089] __x64_sys_clone3+0x375/0x3a0 [ 2112.149727][T28089] ? __ia32_sys_clone+0x300/0x300 [ 2112.154585][T28089] ? ksys_write+0x25f/0x2c0 [ 2112.158925][T28089] ? debug_smp_processor_id+0x17/0x20 [ 2112.164133][T28089] do_syscall_64+0x44/0xd0 [ 2112.168386][T28089] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2112.174112][T28089] RIP: 0033:0x7f8f8bc980c9 [ 2112.178365][T28089] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2112.197817][T28089] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2112.206054][T28089] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2112.213865][T28089] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 07:19:27 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x1003d) 07:19:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x7, 0x0, 0x0}, 0x58) [ 2112.221678][T28089] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2112.229489][T28089] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2112.237561][T28089] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2112.245375][T28089] 07:19:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 77) 07:19:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10082) 07:19:28 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x4) 07:19:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x8, 0x0, 0x0}, 0x58) 07:19:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x600000000000000) 07:19:28 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x100f1) 07:19:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10190) [ 2112.782296][T28118] FAULT_INJECTION: forcing a failure. [ 2112.782296][T28118] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.795657][T28118] CPU: 0 PID: 28118 Comm: syz-executor.1 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2112.807117][T28118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2112.817012][T28118] Call Trace: [ 2112.820134][T28118] [ 2112.822911][T28118] dump_stack_lvl+0x151/0x1b7 [ 2112.827421][T28118] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2112.832723][T28118] dump_stack+0x15/0x17 [ 2112.836708][T28118] should_fail+0x3c0/0x510 [ 2112.840966][T28118] __should_failslab+0x9f/0xe0 [ 2112.845562][T28118] should_failslab+0x9/0x20 [ 2112.849907][T28118] kmem_cache_alloc+0x4f/0x2f0 [ 2112.854508][T28118] ? anon_vma_clone+0xa1/0x4f0 [ 2112.859104][T28118] anon_vma_clone+0xa1/0x4f0 [ 2112.863529][T28118] anon_vma_fork+0x91/0x4f0 [ 2112.867871][T28118] ? anon_vma_name+0x43/0x70 [ 2112.872299][T28118] dup_mmap+0x750/0xea0 [ 2112.876300][T28118] ? __delayed_free_task+0x20/0x20 [ 2112.881236][T28118] ? mm_init+0x807/0x960 [ 2112.885315][T28118] dup_mm+0x91/0x330 [ 2112.889051][T28118] copy_mm+0x108/0x1b0 [ 2112.892951][T28118] copy_process+0x1295/0x3250 [ 2112.897469][T28118] ? check_stack_object+0xf7/0x130 [ 2112.902414][T28118] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2112.907360][T28118] ? copy_clone_args_from_user+0x6cf/0x790 [ 2112.913002][T28118] kernel_clone+0x22d/0x990 [ 2112.917342][T28118] ? dup_mmap+0xea0/0xea0 [ 2112.921507][T28118] ? create_io_thread+0x1e0/0x1e0 [ 2112.926367][T28118] ? file_end_write+0x1b0/0x1b0 [ 2112.931058][T28118] __x64_sys_clone3+0x375/0x3a0 [ 2112.935745][T28118] ? __ia32_sys_clone+0x300/0x300 [ 2112.940606][T28118] ? ksys_write+0x25f/0x2c0 [ 2112.944941][T28118] ? debug_smp_processor_id+0x17/0x20 [ 2112.950154][T28118] do_syscall_64+0x44/0xd0 [ 2112.954406][T28118] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2112.960133][T28118] RIP: 0033:0x7f8f8bc980c9 [ 2112.964410][T28118] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2112.983832][T28118] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2112.992073][T28118] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 [ 2112.999880][T28118] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2113.007690][T28118] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2113.015503][T28118] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2113.023574][T28118] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2113.031390][T28118] 07:19:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x9, 0x0, 0x0}, 0x58) 07:19:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x101ae) 07:19:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 78) 07:19:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10204) 07:19:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x11, 0x0, 0x0}, 0x58) 07:19:28 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) [ 2113.188573][T28152] FAULT_INJECTION: forcing a failure. [ 2113.188573][T28152] name failslab, interval 1, probability 0, space 0, times 0 [ 2113.203607][T28152] CPU: 1 PID: 28152 Comm: syz-executor.1 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2113.215076][T28152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2113.224967][T28152] Call Trace: [ 2113.228092][T28152] [ 2113.230869][T28152] dump_stack_lvl+0x151/0x1b7 [ 2113.235380][T28152] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2113.240676][T28152] dump_stack+0x15/0x17 [ 2113.244668][T28152] should_fail+0x3c0/0x510 [ 2113.248922][T28152] __should_failslab+0x9f/0xe0 [ 2113.253521][T28152] should_failslab+0x9/0x20 [ 2113.257859][T28152] kmem_cache_alloc+0x4f/0x2f0 [ 2113.265421][T28152] ? anon_vma_fork+0x1b9/0x4f0 [ 2113.270013][T28152] anon_vma_fork+0x1b9/0x4f0 [ 2113.274440][T28152] dup_mmap+0x750/0xea0 [ 2113.278433][T28152] ? __delayed_free_task+0x20/0x20 [ 2113.283381][T28152] ? mm_init+0x807/0x960 [ 2113.287459][T28152] dup_mm+0x91/0x330 [ 2113.291195][T28152] copy_mm+0x108/0x1b0 [ 2113.295097][T28152] copy_process+0x1295/0x3250 [ 2113.299610][T28152] ? check_stack_object+0xf7/0x130 [ 2113.304556][T28152] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2113.309502][T28152] ? copy_clone_args_from_user+0x6cf/0x790 [ 2113.315149][T28152] kernel_clone+0x22d/0x990 [ 2113.319484][T28152] ? dup_mmap+0xea0/0xea0 [ 2113.323656][T28152] ? create_io_thread+0x1e0/0x1e0 [ 2113.328509][T28152] ? file_end_write+0x1b0/0x1b0 [ 2113.333197][T28152] __x64_sys_clone3+0x375/0x3a0 [ 2113.337891][T28152] ? __ia32_sys_clone+0x300/0x300 [ 2113.342749][T28152] ? ksys_write+0x25f/0x2c0 [ 2113.347087][T28152] ? debug_smp_processor_id+0x17/0x20 [ 2113.352294][T28152] do_syscall_64+0x44/0xd0 [ 2113.356547][T28152] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2113.362275][T28152] RIP: 0033:0x7f8f8bc980c9 [ 2113.366528][T28152] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2113.385968][T28152] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2113.394221][T28152] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2113.402031][T28152] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2113.409837][T28152] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2113.417648][T28152] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2113.425460][T28152] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2113.433279][T28152] [ 2113.451512][T28152] ------------[ cut here ]------------ [ 2113.457032][T28152] refcount_t: underflow; use-after-free. [ 2113.470284][T28152] WARNING: CPU: 0 PID: 28152 at lib/refcount.c:28 refcount_warn_saturate+0x165/0x1b0 [ 2113.487044][T28152] Modules linked in: [ 2113.491915][T28152] CPU: 0 PID: 28152 Comm: syz-executor.1 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2113.503779][T28152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2113.513993][T28152] RIP: 0010:refcount_warn_saturate+0x165/0x1b0 [ 2113.524112][T28152] Code: c7 40 60 87 85 31 c0 e8 39 2f e0 fe 0f 0b eb 83 e8 d0 bc 0e ff c6 05 1f 3b 9f 04 01 48 c7 c7 a0 60 87 85 31 c0 e8 1b 2f e0 fe <0f> 0b e9 62 ff ff ff e8 af bc 0e ff c6 05 ff 3a 9f 04 01 48 c7 c7 [ 2113.552744][T28152] RSP: 0018:ffffc9000043f880 EFLAGS: 00010246 [ 2113.575784][T28152] RAX: 728c30dd494e0600 RBX: 0000000000000003 RCX: 0000000000040000 [ 2113.593520][T28152] RDX: ffffc90002c72000 RSI: 0000000000015991 RDI: 0000000000015992 07:19:29 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x5) 07:19:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10281) 07:19:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x70, 0x0, 0x0}, 0x58) 07:19:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x700000000000000) 07:19:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x102ae) [ 2113.606124][T28152] RBP: ffffc9000043f890 R08: ffffffff81584ba9 R09: ffffed103ee065e8 [ 2113.614196][T28152] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff88811624eb08 [ 2113.622119][T28152] R13: 1ffff11022c49d61 R14: 0000000000000003 R15: ffff88811e5762a9 07:19:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x700, 0x0, 0x0}, 0x58) [ 2113.656613][T28152] FS: 00007f8f8a9ea700(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 2113.666259][T28152] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2113.672866][T28152] CR2: 00007f3e18cec6be CR3: 0000000163b50000 CR4: 00000000003526b0 [ 2113.681463][T28152] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2113.698326][T28152] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 07:19:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10300) [ 2113.708558][T28152] Call Trace: [ 2113.711882][T28152] [ 2113.714719][T28152] vm_area_free+0x208/0x230 07:19:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x900, 0x0, 0x0}, 0x58) [ 2113.850072][T28152] dup_mmap+0xbcd/0xea0 [ 2113.859111][T28152] ? __delayed_free_task+0x20/0x20 [ 2113.868923][T28152] ? mm_init+0x807/0x960 [ 2113.873065][T28152] dup_mm+0x91/0x330 [ 2113.877831][T28152] copy_mm+0x108/0x1b0 [ 2113.941422][T28152] copy_process+0x1295/0x3250 [ 2113.946084][T28152] ? check_stack_object+0xf7/0x130 [ 2113.951137][T28152] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2113.956069][T28152] ? copy_clone_args_from_user+0x6cf/0x790 [ 2113.962144][T28152] kernel_clone+0x22d/0x990 [ 2113.966555][T28152] ? dup_mmap+0xea0/0xea0 [ 2113.970731][T28152] ? create_io_thread+0x1e0/0x1e0 [ 2113.975599][T28152] ? file_end_write+0x1b0/0x1b0 [ 2113.980287][T28152] __x64_sys_clone3+0x375/0x3a0 [ 2113.984990][T28152] ? __ia32_sys_clone+0x300/0x300 [ 2113.989917][T28152] ? ksys_write+0x25f/0x2c0 [ 2113.994305][T28152] ? debug_smp_processor_id+0x17/0x20 [ 2113.999579][T28152] do_syscall_64+0x44/0xd0 [ 2114.003784][T28152] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2114.009541][T28152] RIP: 0033:0x7f8f8bc980c9 [ 2114.013766][T28152] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2114.033246][T28152] RSP: 002b:00007f8f8a9ea038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 07:19:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 79) 07:19:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x103ae) 07:19:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, 0x0}, 0x58) [ 2114.041477][T28152] RAX: ffffffffffffffda RBX: 00007f8f8bdb8050 RCX: 00007f8f8bc980c9 [ 2114.049303][T28152] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8a9ea050 [ 2114.057111][T28152] RBP: 00007f8f8a9ea1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2114.064890][T28152] R10: 00007f8f8a9ea050 R11: 0000000000000246 R12: 0000000000000058 [ 2114.072729][T28152] R13: 00007ffc2b453dbf R14: 00007f8f8a9ea300 R15: 0000000000022000 [ 2114.080537][T28152] [ 2114.083377][T28152] ---[ end trace f810534d9d829b8c ]--- [ 2114.148712][T28191] FAULT_INJECTION: forcing a failure. [ 2114.148712][T28191] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2114.162281][T28191] CPU: 0 PID: 28191 Comm: syz-executor.1 Tainted: G B W 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2114.173715][T28191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2114.183614][T28191] Call Trace: [ 2114.186740][T28191] [ 2114.189517][T28191] dump_stack_lvl+0x151/0x1b7 [ 2114.194024][T28191] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2114.199430][T28191] dump_stack+0x15/0x17 [ 2114.203429][T28191] should_fail+0x3c0/0x510 [ 2114.207766][T28191] should_fail_alloc_page+0x58/0x70 [ 2114.212911][T28191] __alloc_pages+0x1de/0x7c0 [ 2114.217320][T28191] ? __count_vm_events+0x30/0x30 [ 2114.222088][T28191] pte_alloc_one+0x73/0x1b0 [ 2114.226435][T28191] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2114.231469][T28191] __pte_alloc+0x86/0x350 [ 2114.235732][T28191] ? free_pgtables+0x210/0x210 [ 2114.240330][T28191] ? _raw_spin_lock+0xa3/0x1b0 [ 2114.244929][T28191] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2114.250143][T28191] ? unwind_get_return_address+0x4c/0x90 [ 2114.255611][T28191] copy_pte_range+0x1b1f/0x20b0 [ 2114.260295][T28191] ? stack_trace_save+0x12d/0x1f0 [ 2114.265158][T28191] ? anon_vma_clone+0xa1/0x4f0 [ 2114.269762][T28191] ? __kunmap_atomic+0x80/0x80 [ 2114.274361][T28191] ? dup_mmap+0x750/0xea0 [ 2114.278533][T28191] ? copy_mm+0x108/0x1b0 [ 2114.282603][T28191] ? copy_process+0x1295/0x3250 [ 2114.287287][T28191] ? kernel_clone+0x22d/0x990 [ 2114.291802][T28191] ? __x64_sys_clone3+0x375/0x3a0 [ 2114.296663][T28191] ? do_syscall_64+0x44/0xd0 [ 2114.301091][T28191] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2114.306996][T28191] copy_page_range+0xc1e/0x1090 [ 2114.311676][T28191] ? pfn_valid+0x1e0/0x1e0 [ 2114.315931][T28191] dup_mmap+0x99f/0xea0 [ 2114.319922][T28191] ? __delayed_free_task+0x20/0x20 [ 2114.324868][T28191] ? mm_init+0x807/0x960 [ 2114.328947][T28191] dup_mm+0x91/0x330 [ 2114.332683][T28191] copy_mm+0x108/0x1b0 [ 2114.336596][T28191] copy_process+0x1295/0x3250 [ 2114.341098][T28191] ? check_stack_object+0xf7/0x130 [ 2114.346045][T28191] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2114.350994][T28191] ? copy_clone_args_from_user+0x6cf/0x790 [ 2114.356637][T28191] kernel_clone+0x22d/0x990 [ 2114.361015][T28191] ? dup_mmap+0xea0/0xea0 [ 2114.365139][T28191] ? create_io_thread+0x1e0/0x1e0 [ 2114.370004][T28191] ? file_end_write+0x1b0/0x1b0 [ 2114.374685][T28191] __x64_sys_clone3+0x375/0x3a0 [ 2114.379373][T28191] ? __ia32_sys_clone+0x300/0x300 [ 2114.384240][T28191] ? ksys_write+0x25f/0x2c0 [ 2114.388577][T28191] ? debug_smp_processor_id+0x17/0x20 [ 2114.393781][T28191] do_syscall_64+0x44/0xd0 [ 2114.398035][T28191] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2114.403762][T28191] RIP: 0033:0x7f8f8bc980c9 [ 2114.408018][T28191] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2114.427631][T28191] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2114.435879][T28191] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 07:19:30 executing program 3: socket$inet6(0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x6) 07:19:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10402) 07:19:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x8bd}]}]}, 0x38}}, 0x900000000000000) 07:19:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x1f00, 0x0, 0x0}, 0x58) 07:19:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10406) 07:19:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 80) [ 2114.443687][T28191] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2114.451501][T28191] RBP: 00007f8f8aa0b1d0 R08: 0000000000000000 R09: 0000000000000058 [ 2114.459310][T28191] R10: 00007f8f8aa0b050 R11: 0000000000000246 R12: 0000000000000058 [ 2114.467214][T28191] R13: 00007ffc2b453dbf R14: 00007f8f8aa0b300 R15: 0000000000022000 [ 2114.475024][T28191] 07:19:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10408) 07:19:30 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback={0x0, 0xffff8881a56043d8}}}) r3 = socket(0x840000000002, 0x3, 0xff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r5, &(0x7f0000000300), 0x20000000}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x5, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x401}, [@generic={0x4, 0x4, 0x0, 0x0, 0x10001}, @alu={0x4, 0x1, 0x4, 0x5, 0x7, 0xffffffffffffffc0, 0xfffffffffffffff0}]}, &(0x7f0000000880)='GPL\x00', 0x0, 0x73, &(0x7f00000008c0)=""/115, 0x41000, 0x8, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x8, 0x8, 0xc5d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[r5]}, 0x80) accept4(0xffffffffffffffff, &(0x7f0000000a80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private2}}, &(0x7f0000000b00)=0x80, 0x80000) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r3, &(0x7f0000000540)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) sendmmsg$inet(r3, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, 0x0) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000480)={@remote, @private, 0x0}, &(0x7f00000004c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', r2, 0x8780, 0x40, 0x4, 0x9, {{0x17, 0x4, 0x2, 0x3, 0x5c, 0x64, 0x0, 0xf8, 0x4, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@ra={0x94, 0x4}, @timestamp_addr={0x44, 0x14, 0x1e, 0x1, 0x2, [{@multicast2, 0x5}, {@rand_addr=0x64010101, 0x7}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x2c, 0xb5, 0x3, 0x7, [{@multicast1, 0x1f26}, {@loopback, 0x7f}, {@empty, 0xe88a}, {@rand_addr=0x64010100, 0x1000}, {@multicast1, 0x3caf}]}]}}}}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r3, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000700)={&(0x7f0000000c80)=ANY=[@ANYBLOB="e8000000b1285e6dc221bfaa8e1e1c20c149bf0dfae413ec4009f483776f1f0ea59a15ac34baee7fc9bc33fcd5e75cad895151cdf9a6d9c96bf9f02596b44fae28e5ba7edde8c5c3aac8ea3c054d1cc1b0c7d977f389ca99ffb456e0d07572af215b1d1601fbf0d549c0428ad4ad269f58397393bdf7c871e58b38a361333d7bd3d4b7574f9f3284aca6b95fc101b7280b34fb62538fd104da078b8b5d753694f20794621ea6cbf4f88dce0979ecda97ad1965a6701de10a8305c1455e3d1405a1b98692a17ff638dc0ba8ddb75bfbf6", @ANYRES16=r6, @ANYBLOB="040029bd7000fedbdf250600000020000180080003000300000014000200767863616e31000000000000000000001400018008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="3c00018008000300030000001400020076657468305f746f5f6261746164760008000100", @ANYRES32=r7, @ANYBLOB="14000200776c616e3100000000000000000000001800018014000200766c616e3000000000000000000000004c00018008000100", @ANYRES32=r8, @ANYBLOB="080003000300000008000300040000001400020073797a6b616c6c6572310000000000001400020076657468305f746f5f626174616476000800030002000000"], 0xe8}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000000) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xd0, r6, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x68, 0x2, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}]}, 0xd0}, 0x1, 0x0, 0x0, 0x400c0}, 0x44) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r6, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x15e8}, @ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x2}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x7}, @ETHTOOL_A_LINKMODES_OURS={0x80, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '][\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'Y\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x54, 0x5, "38ee4d0b98a9ba95f241915d25594bfe86842f14e2356d4bc10002a03b2710ac1ba1a23387ae22ca573bed9f07a3c857f403485627a41d4e752b11c100135f62bdcf3d0182fae0b2f798b4d40313b395"}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xcd}, @ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0xe}]}, 0xc8}}, 0x4000081) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) r9 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r9, 0x800) lseek(r9, 0x200, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r9, r10, 0x0, 0x10000) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) writev(r11, &(0x7f00000005c0)=[{&(0x7f0000000300)="f18362cecbcdcd01067c174d6e0d8036539001efb386fd20114c51aa82081c39252071c55cc67d7887c7fe98be1017fc58cc83bddcf3513f3922135d3f9f2e7cccee2e2b47d7315babe26d6e1260188650ae109644bcf57e070304c7648d64582d6000b86540f8a00f246d7fc53ba90312d7625dc8626fa0e738e48c5ad91fb780895f44a9464a9c78945fd579e3880ce5283bcf11cf8f34ba11edb4ea981c81a41ada338d6bfdf317c4e57b6df56cfa5d49316c2dee180aa54610cedbf4aaea2d0841b1ab34b63fd1037fb0449a884e67ee3b504398520008b1fbdcdb851c04732be20d576c799289e1fe33b1f24f3307e8070b", 0xf4}, {&(0x7f0000000080)="46483643484e66b3a39f929618bdbb50873c377dcd50dc677d64f8b636c202896c17298241c6024bbd5b6416f66949d8a2cb0d19b3683b9785f740ced6e0e655aeabe119e6e2d55e96ff91e37eb5ab1fc9e4d4027fb73cba59836fb9a93967925b6031705d4cc4b0d9cd88adb73fbf906d", 0x71}, {&(0x7f0000000000)="0168de", 0x3}, {&(0x7f0000000480)="359d318ad9fcef287f20cdc4b3fd00a3c8c218e0413959220c228ff6ed831bd4bddde663338de41af115e85f0d15c19df1c73ea6498c0de43cc8b9af16787ba9061df6d2bcd3bd5c64dbc5efcaaac2a5ce7bbf129391c4b566a1432a3f6eb4cb0335708c8432bfbe", 0x68}, {&(0x7f00000001c0)="8fefa9bff33c7f51fc43d6", 0xb}, {&(0x7f0000000500)="c7dc79029caef361e4724985c38c41e141bda2246fb2034c3cdd1e2eb0d2e81b93324c95d89e7fa3a149571b227c5792d85300857399281357f2bfaa6179ec8cfc30d3433307b0e6c8b432883a793e71b46d985cc1f06711da9d4c97fc42cca271f33b59176457dde63d8577076898d7777ede6accfb0369ce78613e3ddfa1b9404b8600"/146, 0x92}, {&(0x7f0000000280)="3df2d9faf9f7075183b72717dededcb056cd26859f0c3281", 0x18}], 0x7) 07:19:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x104ae) 07:19:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x10500) 07:19:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup3(r0, r1, 0x0) syz_clone3(&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58) [ 2114.578624][T28204] FAULT_INJECTION: forcing a failure. [ 2114.578624][T28204] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2114.611569][T28204] CPU: 1 PID: 28204 Comm: syz-executor.1 Tainted: G B W 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2114.623032][T28204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2114.632929][T28204] Call Trace: [ 2114.636049][T28204] [ 2114.638827][T28204] dump_stack_lvl+0x151/0x1b7 [ 2114.643343][T28204] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2114.648638][T28204] dump_stack+0x15/0x17 [ 2114.652639][T28204] should_fail+0x3c0/0x510 [ 2114.657068][T28204] should_fail_alloc_page+0x58/0x70 [ 2114.662099][T28204] __alloc_pages+0x1de/0x7c0 [ 2114.666530][T28204] ? __count_vm_events+0x30/0x30 [ 2114.671406][T28204] pte_alloc_one+0x73/0x1b0 [ 2114.675740][T28204] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2114.680778][T28204] __pte_alloc+0x86/0x350 [ 2114.684940][T28204] ? irqentry_exit+0x30/0x40 [ 2114.689368][T28204] ? sysvec_call_function_single+0x55/0xc0 [ 2114.695042][T28204] ? free_pgtables+0x210/0x210 [ 2114.699615][T28204] copy_pte_range+0x1b1f/0x20b0 [ 2114.704425][T28204] ? stack_trace_save+0x12d/0x1f0 [ 2114.709243][T28204] ? anon_vma_clone+0xa1/0x4f0 [ 2114.713842][T28204] ? __kunmap_atomic+0x80/0x80 [ 2114.718442][T28204] ? irqentry_exit+0x30/0x40 [ 2114.722869][T28204] ? sysvec_call_function_single+0x55/0xc0 [ 2114.728511][T28204] ? asm_sysvec_call_function_single+0x1b/0x20 [ 2114.734501][T28204] ? copy_pte_range+0x1a16/0x20b0 [ 2114.739362][T28204] copy_page_range+0xc1e/0x1090 [ 2114.744052][T28204] ? pfn_valid+0x1e0/0x1e0 [ 2114.748302][T28204] dup_mmap+0x99f/0xea0 [ 2114.752295][T28204] ? __delayed_free_task+0x20/0x20 [ 2114.757242][T28204] ? mm_init+0x807/0x960 [ 2114.761323][T28204] dup_mm+0x91/0x330 [ 2114.765053][T28204] copy_mm+0x108/0x1b0 [ 2114.768965][T28204] copy_process+0x1295/0x3250 [ 2114.773472][T28204] ? check_stack_object+0xf7/0x130 [ 2114.778422][T28204] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2114.783373][T28204] ? copy_clone_args_from_user+0x6cf/0x790 [ 2114.789016][T28204] kernel_clone+0x22d/0x990 [ 2114.793349][T28204] ? dup_mmap+0xea0/0xea0 [ 2114.797511][T28204] ? create_io_thread+0x1e0/0x1e0 [ 2114.802373][T28204] ? file_end_write+0x1b0/0x1b0 [ 2114.807061][T28204] __x64_sys_clone3+0x375/0x3a0 [ 2114.811746][T28204] ? __ia32_sys_clone+0x300/0x300 [ 2114.816608][T28204] ? ksys_write+0x25f/0x2c0 [ 2114.820947][T28204] ? debug_smp_processor_id+0x17/0x20 [ 2114.826155][T28204] do_syscall_64+0x44/0xd0 [ 2114.830407][T28204] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2114.836135][T28204] RIP: 0033:0x7f8f8bc980c9 [ 2114.840389][T28204] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2114.859832][T28204] RSP: 002b:00007f8f8aa0b038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2114.868081][T28204] RAX: ffffffffffffffda RBX: 00007f8f8bdb7f80 RCX: 00007f8f8bc980c9 07:19:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001c00000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_da_write_pages_extent\x00', r0}, 0x10) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x200, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x24080, 0x0) sendfile(r1, r2, 0x0, 0x105ae) [ 2114.875889][T28204] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00007f8f8aa0b050 [ 2