last executing test programs: 22.432836966s ago: executing program 2 (id=1838): ioctl$SNDRV_TIMER_IOCTL_CREATE(0xffffffffffffffff, 0xc02054a5, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r0, 0x2, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x814) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x1c, 0x0, 0x2, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000740), 0x40002, 0x0) memfd_secret(0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000b80)={0x29, 0x6, 0x0, {0x6, 0x6}}, 0x29) 22.432286916s ago: executing program 2 (id=1839): setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@remote, @in6=@local, 0x0, 0x5, 0x0, 0xffff, 0xa, 0x0, 0x100}, {0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0xda94}, {0x0, 0x4, 0x0, 0xa78a}, 0x5, 0x0, 0x1, 0x0, 0x3}, {{@in=@private=0x4, 0x8000000, 0x2b}, 0x0, @in=@rand_addr=0x64010101, 0x1, 0x0, 0x1, 0x7, 0x0, 0x0, 0x3}}, 0xe8) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280), 0x80, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000340)='P'}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x8c) r1 = openat$incfs(r0, &(0x7f00000001c0)='.pending_reads\x00', 0x0, 0x130) prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x38) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0xc058671e, &(0x7f00000000c0)) 22.404536517s ago: executing program 2 (id=1840): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x1214040, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x21480a3, 0x0) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000780)=""/227, 0xe3}, {&(0x7f0000001a40)=""/217, 0xd9}, {&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000001d80)=""/161, 0xa1}, {&(0x7f0000000680)=""/134, 0x86}, {&(0x7f0000002c40)=""/146, 0x92}, {&(0x7f0000002d00)=""/128, 0x80}, {&(0x7f0000000000)=""/260, 0x104}, {&(0x7f0000000440)=""/93, 0x5d}], 0x9}, 0xe}, {{0x0, 0x0, 0x0}, 0xa}, {{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, 0x0}, 0xffffffff}, {{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x88, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x74, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x4044010}, 0x40021) 22.341452101s ago: executing program 2 (id=1841): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'vlan1\x00', 0x4000}) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x5) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000001c0)={0x5, 0x1ff, 0x6d, 0x8}, 0x10) sendmsg$netlink(r2, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x40}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000080)=0x8) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1, 0x0, 0x0, 0x3ba1a1ed64c038bf}, 0x0) 22.316751542s ago: executing program 2 (id=1843): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000002c0)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)={0x54, r1, 0x5, 0x70bd2a, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0x38, 0x8, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x40) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x32, &(0x7f0000000f00)=0x1000000, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'veth0_macvtap\x00', 0x0}) sendmmsg$inet(r3, &(0x7f0000000000)=[{{&(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @local, @loopback}}}], 0x20}}], 0x1, 0x4000004) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000140)=0x80000001, 0x4) r6 = socket$inet(0x2, 0xa, 0x2) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'veth0_to_bond\x00', 0x0}) sendto$packet(r5, &(0x7f0000000040)="5a181e9f51242cb3d81414ef4a74", 0xe, 0x90, &(0x7f0000000000)={0x11, 0x8, r7, 0x1, 0x6}, 0x14) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000940)={'syztnl0\x00', &(0x7f00000008c0)={'syztnl1\x00', 0x0, 0x4, 0x7a, 0x3, 0xbdf, 0x49, @remote, @empty, 0x1, 0x80, 0x1ff, 0x1}}) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r9, 0x107, 0xf, &(0x7f0000000040)=0x46c, 0x4) r10 = socket(0x2, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendto$packet(r9, &(0x7f00000026c0)="280320000a00140000007ef506be00000000000000000000000000143baa110b1f858ce632f47042195eb3cf545a41b6d7883998070069faee78005e16f37fe8facc5cca5653b1a260eaf135b1dfb0df9314db380f7456c6498dc869b27cf7fe6eabed081491d4f2c822f2c4937e2b0af97dd4fa0780fd8fb14dcb77820a77a5d267e03d3b8ad3856db2be0b8ca4f40d5f1bb194de569b4ef5d95dba36b6dcdb8608b78011d5cfd91c4e3875eb7747e6000b72bfedec06116228af9359180cdaa8a0b77dd13e07fc3a29701c972afc7e9798c4e984f01f7f74b82d4657528b1e", 0xe0, 0x20008094, &(0x7f0000000080)={0x11, 0x3, r11, 0x1, 0xe1, 0x6, @random="76caa646ae4c"}, 0x14) r12 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r12, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x33e000, 0x1000}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r12, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r13 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r12, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r13, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r12, 0x11b, 0x5, &(0x7f0000000300)=0x1, 0x4) bind$xdp(r12, &(0x7f0000000100)={0x2c, 0x0, r14}, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000cc0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000980)={0x2cc, 0x0, 0x200, 0x70bd2b, 0x200, {}, [@HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x96f2337e71ddc571}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}]}, 0x2cc}, 0x1, 0x0, 0x0, 0x20008000}, 0x4) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f00000000c0)={&(0x7f0000000040)=""/64, 0x40}) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="300000002400df1e02000000fadbdf25000000001000000000000800", @ANYRES32], 0x30}], 0x1}, 0x0) 22.193316918s ago: executing program 2 (id=1844): openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.kill\x00', 0x275a, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1, 0x2, 0x1b8, 0x2}) fcntl$lock(r1, 0x6, &(0x7f0000000200)={0x0, 0x0, 0x3b5, 0x1fd}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x2) r5 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000a80)={{0x2, 0x4e20, @empty}, {}, 0x4a, {0x2, 0x0, @rand_addr=0x64010101}, 'lo\x00'}) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @loopback}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x18, {0x2, 0x0, @empty}, 'lo\x00'}) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000080)=@rnullb, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x1d0, r3, 0x200, 0x70bd27, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x40}, 0x10000002) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r6) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRES32=r2, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000001e00)={0x2020}, 0x2020) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) r8 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r8, 0x10e, 0xc, &(0x7f0000000200)=""/210, &(0x7f0000000180)=0xd2) close_range(r7, 0xffffffffffffffff, 0x0) r9 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x80000) getpeername$inet(r9, &(0x7f0000000180), &(0x7f00000001c0)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 22.165871269s ago: executing program 32 (id=1844): openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.kill\x00', 0x275a, 0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1, 0x2, 0x1b8, 0x2}) fcntl$lock(r1, 0x6, &(0x7f0000000200)={0x0, 0x0, 0x3b5, 0x1fd}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0), 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x2) r5 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000a80)={{0x2, 0x4e20, @empty}, {}, 0x4a, {0x2, 0x0, @rand_addr=0x64010101}, 'lo\x00'}) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @loopback}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x18, {0x2, 0x0, @empty}, 'lo\x00'}) r6 = socket$netlink(0x10, 0x3, 0x0) writev(r6, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000080)=@rnullb, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x1d0, r3, 0x200, 0x70bd27, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5}}, {@pci={{0x8}, {0x11}}, {0xd}, {0x5, 0x83, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x40}, 0x10000002) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r6) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRES32=r2, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000001e00)={0x2020}, 0x2020) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) r8 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$netlink(r8, 0x10e, 0xc, &(0x7f0000000200)=""/210, &(0x7f0000000180)=0xd2) close_range(r7, 0xffffffffffffffff, 0x0) r9 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x80000) getpeername$inet(r9, &(0x7f0000000180), &(0x7f00000001c0)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 12.833211767s ago: executing program 0 (id=1869): r0 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) kcmp(r0, r1, 0x1, 0xffffffffffffffff, r2) r3 = socket(0x14, 0x880d151ee9fe5374, 0xca8) setsockopt$MRT_ADD_MFC_PROXY(r3, 0x0, 0xd2, &(0x7f0000000040)={@multicast1, @remote, 0x1, "14c50666aee398b845eb1249cb5b6c0027ae1efeb8265fc4a58fe06df1f7b7f8", 0x0, 0x5, 0x7ff, 0x10000}, 0x3c) r4 = syz_open_pts(0xffffffffffffffff, 0x40) ioctl$TCSBRKP(r4, 0x5425, 0x1) r5 = ioctl$USERFAULTFD_IOC_NEW(0xffffffffffffffff, 0xaa00) ioctl$UFFDIO_CONTINUE(r5, 0xc020aa07, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}}) (async, rerun: 64) fcntl$setpipe(r4, 0x407, 0xfff) (rerun: 64) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000000c0)={0x6, 'pim6reg0\x00', {0x225}, 0x100}) (async) r6 = socket(0x8, 0x800, 0x7d5) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r6) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r7, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x480c0) (async) r8 = socket$can_raw(0x1d, 0x3, 0x1) r9 = accept(r8, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000002c0)=0x80) r11 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x9) syz_kvm_setup_cpu$x86(r11, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000380)=[@text64={0x40, &(0x7f0000000300)="66b830008ed8b805000000b9050000000f01d9b805000000b9c70000000f01d9c461b964b4f8213f0000c401f25e8500200000710f440f0966b8ea008ee8440f01c9b805000000b90b8300000f01d9", 0x4f}], 0x1, 0x29, &(0x7f00000003c0)=[@cstype0={0x4, 0x3}], 0x1) (async) r12 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), r10) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000000580)={'erspan0\x00', &(0x7f0000000480)={'erspan0\x00', 0x0, 0x8700, 0x700, 0x9, 0x5, {{0x2d, 0x4, 0x0, 0x7, 0xb4, 0x64, 0x0, 0xd, 0x29, 0x0, @multicast1, @broadcast, {[@timestamp={0x44, 0x18, 0x86, 0x0, 0x3, [0x5, 0xffff9459, 0x6, 0x0, 0x8]}, @timestamp={0x44, 0x14, 0x53, 0x0, 0x6, [0x5, 0x8, 0x2, 0xffff]}, @rr={0x7, 0x1f, 0x44, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @private=0xa010101, @loopback, @empty, @remote]}, @timestamp_prespec={0x44, 0x1c, 0x32, 0x3, 0xc, [{@multicast1, 0xe06b}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x2}, {@multicast1, 0x4}]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x7, 0xdc, [@private=0xa010100]}, @timestamp_addr={0x44, 0x2c, 0x59, 0x1, 0x5, [{@remote, 0x1ff}, {@rand_addr=0x64010101, 0xcd69}, {@private=0xa010100, 0xb2}, {@local, 0x8}, {@private=0xa010100}]}, @noop]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000005c0)={'ip6gre0\x00', 0x0, 0x29, 0x17, 0x7, 0x6, 0xb, @mcast2, @mcast2, 0x1, 0x8098, 0x1, 0x800}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000700)={'syztnl2\x00', &(0x7f0000000680)={'syztnl1\x00', 0x0, 0x2f, 0x6, 0x0, 0x8, 0x43, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xb}}, @empty, 0x1, 0x40, 0x5, 0x7}}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r6, &(0x7f0000000840)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f0000000740)={0x90, r12, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x800}, 0x4000) (async, rerun: 64) r16 = fcntl$dupfd(r10, 0x0, r3) (rerun: 64) write$P9_RGETLOCK(r16, &(0x7f0000000880)={0x1e, 0x37, 0x1, {0x0, 0x8000, 0x5, r1}}, 0x1e) (async) madvise(&(0x7f0000fec000/0x1000)=nil, 0x1000, 0xc) (async, rerun: 32) r17 = syz_init_net_socket$bt_rfcomm(0x1f, 0x1, 0x3) (rerun: 32) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r17, 0x8982, &(0x7f00000008c0)) ioctl$UI_BEGIN_FF_UPLOAD(r16, 0xc06855c8, &(0x7f0000000900)={0xd, 0x6, {0x57, 0x377d, 0x1ff, {0xf5}, {0xd7, 0xc}, @cond=[{0x7, 0xfffc, 0x4, 0x6, 0x7, 0x400}, {0x87e, 0x9, 0x8, 0x8, 0xa}]}, {0x52, 0x1ff, 0x58, {0x2, 0x9}, {0x4bf0, 0xfffa}, @cond=[{0x80, 0x1, 0x4, 0x4, 0x352, 0x76}, {0xd, 0xb, 0x30, 0x21e, 0x2, 0x5}]}}) 12.832616187s ago: executing program 1 (id=1870): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x129942, 0x18) fcntl$setlease(r0, 0x400, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x80000, 0xd3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x82040, 0x170) r2 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x133042, 0x19) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/locks\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f0000001500)={'tunl0\x00', &(0x7f0000001340)={'gre0\x00', 0x0, 0x1, 0x7, 0xd57, 0x101, {{0x50, 0x4, 0x2, 0x5, 0x140, 0x65, 0x0, 0x3, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x44}, @broadcast, {[@generic={0x94, 0xe, "a5ad8675234cc1b53af9d9cb"}, @rr={0x7, 0x13, 0x2c, [@dev={0xac, 0x14, 0x14, 0x19}, @loopback, @multicast2, @multicast2]}, @lsrr={0x83, 0x13, 0xbb, [@dev={0xac, 0x14, 0x14, 0x3b}, @rand_addr=0x64010100, @remote, @empty]}, @timestamp_prespec={0x44, 0x54, 0x7f, 0x3, 0x5, [{@private=0xa010101, 0xd59}, {@remote}, {@dev={0xac, 0x14, 0x14, 0x3a}, 0xfffffffe}, {@multicast2, 0x101}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffffe83}, {@loopback, 0x10001}, {@dev={0xac, 0x14, 0x14, 0x17}}, {@multicast1, 0xc7ba}, {@local, 0x1000}]}, @end, @rr={0x7, 0x17, 0x5d, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, @rand_addr=0x64010100, @local, @multicast1]}, @timestamp_prespec={0x44, 0x24, 0xf, 0x3, 0x1, [{@empty, 0x737}, {@remote, 0x101}, {@loopback, 0x5}, {@dev={0xac, 0x14, 0x14, 0x33}, 0x6108}]}, @noop, @timestamp_addr={0x44, 0x34, 0xf1, 0x1, 0x3, [{@rand_addr=0x64010102, 0x8}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x14}, 0xef3}, {@loopback, 0x4e1}, {@rand_addr=0x64010102, 0x4}, {@broadcast, 0x6}]}, @ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x2c, 0x6c, 0x1, 0x9, [{@remote, 0x80}, {@multicast1, 0x9}, {@broadcast, 0x3}, {@rand_addr=0x64010101, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}]}]}}}}}) r5 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000005c0)={'ip6gretap0\x00', 0x0}) bind$packet(r5, &(0x7f0000000180)={0x11, 0x3, r6, 0x1, 0x1, 0x6, @broadcast}, 0x14) r7 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r7, 0x0, 0x0, 0x12040, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000280)={'sit0\x00', 0x0}) sendto$packet(r8, &(0x7f00000002c0)="05031600d3fc140000004788031c09103328", 0x12, 0x4000004, &(0x7f0000000140)={0x11, 0x86dd, r9, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000015c0)={'ip6tnl0\x00', &(0x7f0000001540)={'syztnl1\x00', 0x0, 0x4, 0x2, 0x2, 0x9, 0x30, @local, @empty, 0x0, 0x80, 0x0, 0x2}}) r11 = socket$unix(0x1, 0x5, 0x0) r12 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r12, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r12, &(0x7f00000000c0)={0x1d, r13}, 0x10) sendmsg$can_bcm(r12, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="0100000003ece1e40ad8871461ab0800", @ANYRES64=0x0, @ANYRES64=r13, @ANYRES64=0x0, @ANYRES64=r11, @ANYBLOB="3bf81bb9f9"], 0x20000600}, 0x1, 0x0, 0x0, 0x20048000}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000001680)={'syztnl1\x00', &(0x7f0000001600)={'syztnl0\x00', r10, 0x29, 0x4, 0xdb, 0x4, 0x52, @mcast2, @dev={0xfe, 0x80, '\x00', 0x3c}, 0x7f69, 0x8, 0x7, 0x8}}) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000016c0)={@empty, @initdev, 0x0}, &(0x7f0000001700)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000001800)={'syztnl0\x00', &(0x7f0000001740)={'gretap0\x00', 0x0, 0x700, 0x700, 0xbb2, 0x10000, {{0x1f, 0x4, 0x3, 0x4, 0x7c, 0x64, 0x0, 0x7, 0x29, 0x0, @multicast2, @loopback, {[@cipso={0x86, 0x18, 0x2, [{0x0, 0x12, "34eefed9af1e191b6ee04759bcd96f3f"}]}, @lsrr={0x83, 0xf, 0x7a, [@remote, @dev={0xac, 0x14, 0x14, 0x2f}, @loopback]}, @rr={0x7, 0xb, 0xc7, [@dev={0xac, 0x14, 0x14, 0xc}, @private=0xa010100]}, @ssrr={0x89, 0x1b, 0x9c, [@loopback, @broadcast, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010100]}, @cipso={0x86, 0x17, 0x0, [{0x0, 0x11, "f15994dd10dabc56bd7957cd985038"}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000001880)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000001940)={'syztnl0\x00', &(0x7f00000018c0)={'ip6gre0\x00', 0x0, 0x4, 0x7, 0x4, 0x6, 0xe3c02290c005c135, @remote, @private1, 0x7800, 0x40, 0x7, 0xf4}}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000019c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001980)={&(0x7f0000002740)=ANY=[@ANYBLOB='H\b\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000fcdbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="f400028038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400a752000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000100000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000005000300030000000800040007000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004006400000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="280202803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400300d00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000700000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000100008040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004009801000008000100", @ANYRES32=0x0, @ANYBLOB="84000280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000100000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="0c0102a054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000024009a1204000300080905000000a30005040600000002000009010000000d00090bff0000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000200000008000100", @ANYRES32=r6, @ANYBLOB="bc00028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r9, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000700000008000600", @ANYRES32=r10, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="680102803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400090000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r16, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004001000000008000100", @ANYRES32=r17, @ANYBLOB="2c01028038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040008000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000400000008000600", @ANYRES32=r18, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004003e40000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000500000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000200000008000600", @ANYRES32=r19, @ANYBLOB], 0x848}, 0x1, 0x0, 0x0, 0x4}, 0x5) preadv(r3, &(0x7f0000001e80)=[{&(0x7f0000000080)=""/4094, 0xffe}], 0x1, 0x33, 0x0) 12.832153987s ago: executing program 3 (id=1871): ioctl$SNDRV_TIMER_IOCTL_CREATE(0xffffffffffffffff, 0xc02054a5, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x14, r0, 0x2, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x814) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x4c, 0x0, 0x2, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x33}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xd}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x2c}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x32}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xe}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0xe}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000740), 0x40002, 0x0) memfd_secret(0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000b80)={0x29, 0x6, 0x0, {0x6, 0x6}}, 0x29) 9.751128742s ago: executing program 0 (id=1872): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x22, 0xf, {[@local=@item_4={0x3, 0x2, 0x7, "1d0ee5d8"}, @local=@item_4={0x3, 0x2, 0x8, "4d501821"}, @global=@item_4={0x3, 0x1, 0x6, "80568cea"}]}}, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000340)={0x24, &(0x7f0000000100)={0x20, 0x21, 0x94, {0x94, 0x23, "facb812c32663c85adcb44b0ba9918c15a752a6ca8db5701a8ad4045469dc08f37386f69938f55eb09181f9d587c79b3127b4240aef56eb40c10f4106be790261adb70f413bb0bf3ffb2b056adb3e63ba4fde85d66d426d44095a2e496b45d5d216f10a520349e9b93713476311716ad88908d5045f9278c45296b78027d0e3973791ab60d6035cce75b40f0bc2170801fcb"}}, &(0x7f00000001c0)={0x0, 0x3, 0x56, @string={0x56, 0x3, "66e1387550d50b59df4058b1d6334dae51fb82b82fcac298b91ee0407907b6dadef93d4b6fce265967dc40b55fd23ee1908aa26fd20f0c32da4e86e18c18fb9ccf03521dd82fb638840387d07401b7d5df5f4ffc"}}, &(0x7f0000000240)={0x0, 0x22, 0x1d, {[@global=@item_012={0x2, 0x1, 0x4, "9c8c"}, @local=@item_012={0x2, 0x2, 0x2, '\'\a'}, @local=@item_4={0x3, 0x2, 0x5, "d2ff2427"}, @global=@item_4={0x3, 0x1, 0xa, "030fd762"}, @main=@item_4={0x3, 0x0, 0xa, "4cff9d39"}, @global=@item_012={0x2, 0x1, 0xb, "e588"}, @local=@item_4={0x3, 0x2, 0x0, "f34ec3e4"}]}}, &(0x7f0000000300)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4d, 0x8, 0x1, {0x22, 0xb80}}}}, &(0x7f0000000580)={0x2c, &(0x7f0000000380)={0x40, 0xa, 0x6c, "251a74121a2c7498282ef411d717f411596beed632d81dbad046204ac341c22f9391dc1d42bf54f29406bb5067a609f2469c70c8016e3bac2d59eb1609ee9dbc86e18f5cfcce92902d294c3890b102c4e0e4b0f14f058eb4b7d19f7c4bc5902c6578f7d3d9dc5a76c1c10ab1"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x5}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x5}, &(0x7f0000000480)={0x20, 0x1, 0xa4, "c9851f5ee27de295560ce4648d1cfa6a41711117611e08388b00edf551933c22fae636474487aec65ccf5d52014f62cfbf8669b0351cc931add7c22e284a3d341cb8a38bbf6daa5350f1f240979487fdeb157ce7a29ee32baf4c3375158cf7605bad5b0eb95378a0b10aaa232386f4acfa3c59ade7dba6c0fdaee3583e2b814212e78d2facaf39b1bbc7d4ef66e238be34d5df4fa84f1e3896b652c922e34d353ee82242"}, &(0x7f0000000540)={0x20, 0x3, 0x1, 0x7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @multicast}) write$cgroup_int(r2, &(0x7f0000000680)=0x3ff, 0x12) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'batadv0\x00', 0x0}) sendto$packet(r2, &(0x7f00000005c0)="e0a5735411fff39876563492a96c0cd06e2a35aefa46", 0x16, 0x4010, &(0x7f0000000640)={0x11, 0x10, r3, 0x1, 0x5, 0x6, @multicast}, 0x14) r4 = syz_open_dev$hidraw(&(0x7f0000000280), 0x82, 0x2) ioctl$HIDIOCGFEATURE(r4, 0xc0404807, &(0x7f0000000000)={0x3, "ceed9d47f764deeebcda6eddf031d6b701e4c63d076c79c1a789634a569aa742481dc08de6ca5e7199aed315ebe7c568a06058830296ba6f95c50a6ade0eee5f"}) 9.749503952s ago: executing program 1 (id=1873): r0 = socket(0x1e, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, 0x0, &(0x7f0000000140)) syz_usb_connect(0x0, 0x24, &(0x7f0000004200)=ANY=[], 0x0) 9.746316122s ago: executing program 3 (id=1874): r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000000000107e05192000000000000109022d0001000000000904000005030015000921050000012205000905810320"], 0x0) getgroups(0x2, &(0x7f0000000340)=[0xffffffffffffffff, 0xffffffffffffffff]) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\b\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) 8.024652918s ago: executing program 0 (id=1875): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x88201, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) sendto(r3, 0x0, 0x40, 0x810, &(0x7f00000008c0)=@nl=@unspec={0x0, 0x700, 0x0, 0x80fe}, 0x80) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e20, 0x8001, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x5}, 0x1c) r4 = syz_clone(0x2028411, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace(0x4210, r4) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="44000000140001000000000000000000020000000400000014000b0000000006000000000000000000000001150002"], 0x44}, 0x1, 0x0, 0x0, 0x2004c880}, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000180)={[{@uuid_on}]}) bind$inet6(r3, &(0x7f0000000700)={0xa, 0x4e22, 0xae8, @mcast1, 0x1}, 0x1c) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f00000051c0)={0x1, 0x1000}, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0x73220c8b}], 0x1}, 0x0) recvmmsg(r7, &(0x7f0000001140)=[{{0x0, 0x0, 0x0}, 0x4}, {{0x0, 0x0, 0x0}, 0x2}], 0x2, 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x42, &(0x7f0000000000)=[@vmwrite={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x9}], 0x1) syz_clone3(&(0x7f0000000680)={0x14080000, &(0x7f0000000280), &(0x7f0000000300)=0x0, &(0x7f0000000380), {0x5}, &(0x7f0000000580)=""/254, 0xfe, &(0x7f00000003c0)=""/52, &(0x7f0000000400)=[r4, 0x0, r4], 0x3}, 0x58) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r10, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x30, r11, 0x1, 0x0, 0x25dfdbfc, {{}, {}, {0x14, 0x17, {0x17, 0x0, @l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x30}}, 0x0) sched_getaffinity(r9, 0x8, &(0x7f0000000440)) ioctl$KVM_RUN(r6, 0xae80, 0x0) 8.024497438s ago: executing program 1 (id=1876): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x400402) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000400)={0x23, 0x1, 0x6, 0xffff, 0x0, 0x5, 0x0}) clock_gettime(0xfffffffffffffffb, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(0xffffffffffffffff, 0x1, 0x0, 0x0) inotify_init() writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff0600000001000000450000002500000019000400430000000200000000000006040000000000f93132", 0x39}], 0x1) 8.022828108s ago: executing program 3 (id=1877): getpgid(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x408, 0x103) mount$cgroup2(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x10848, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000480)={0x2c, 0x10, 0x1, 0x2, 0x25dfdbfe, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x7}, @nested={0x4, 0x11}, @typed={0xc, 0x10, 0x0, 0x0, @u64=0x6}]}, 0x2c}], 0x1}, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x17, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x8e1}, 0x20000080) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'lo\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)={0x1c, r5, 0x719, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEV(r3, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x34, r5, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x4000004) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000027f0007000000000002"], 0x18) r7 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_X86_SET_MSR_FILTER(0xffffffffffffffff, 0x4188aec6, &(0x7f0000003f80)={0x1, [{0x2, 0x0, 0xe, 0x0}, {0x0, 0x0, 0x7, 0x0}, {0x3, 0x208, 0x3ff, &(0x7f0000000400)="f8d03f86b94797d17b8687d60868686b0ef9a071e9df67c8183bf291588bc3306a208aa076e787a94614b492f20d5710892d5b4e637c5e8deff1478dbe48cd883c"}, {0x3, 0x0, 0xfffffff8, 0x0}, {0x0, 0x0, 0xfa, 0x0}, {0x1, 0x0, 0xfffffff8, 0x0}, {0x0, 0x0, 0xa17, 0x0}, {0x1, 0x0, 0x1, 0x0}, {0x0, 0x168, 0x10000, &(0x7f0000003980)="21f9105fb008def0728faf4b5200028e2a89cbeda592ef5ce73804b1b6a78f27091556dbe373521b2fe84300d8"}, {0x1, 0x0, 0x80000001, 0x0}, {0x3, 0x0, 0x1, &(0x7f0000003ac0)}, {0x1, 0x70, 0x0, &(0x7f0000003bc0)="56d0a315e26081d99ce5da207d19"}, {0x3, 0x170, 0x4, &(0x7f0000003cc0)="7dfd67ecf6491a5fdee55a73e1773dc59455ca52f3c6fa0f814ed2466c1b85811a4f2223ae81ff54658f9646489d"}, {0x0, 0x0, 0x9, 0x0}, {0x4, 0xe30, 0xffffff7b, &(0x7f0000000dc0)="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"}, {0x2, 0x0, 0x101, 0x0}]}) r8 = dup(r7) ioctl$KVM_X86_SET_MCE(r8, 0x4040ae9e, &(0x7f0000000000)={0x1300000000000000, 0x8080000, 0x0, 0x9, 0x10}) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4400ae8f, &(0x7f0000000040)=@x86={0x0, 0x9, 0xc, 0x0, 0x6, 0x1, 0x86, 0x2, 0xe7, 0x40, 0x2, 0x7, 0x0, 0x7, 0x4, 0x7, 0x5, 0xff, 0x4, '\x00', 0x8, 0x7ffffffffffffffe}) ioctl$KVM_RUN(r8, 0xae80, 0x0) 6.184202231s ago: executing program 0 (id=1878): ptrace(0x10, 0x0) timer_create(0x6, 0x0, 0x0) r0 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x143802, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') getdents64(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x12, r0, 0x32c29000) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000084}, 0x0) madvise(&(0x7f000012c000/0x3000)=nil, 0x3000, 0xe) ioctl$BLKRRPART(r0, 0x125f, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x822b01) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r3, 0x29, 0x3e, &(0x7f00002cef88)="d84f", 0x2) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x23, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) (fail_nth: 78) 6.18327769s ago: executing program 1 (id=1879): symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') chmod(&(0x7f0000000100)='./file0\x00', 0x3dc) unlink(&(0x7f0000000000)='./file0\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'bond0\x00', 0x2}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'bond0\x00', 0x2}) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000a40)="2e9b3d0007e03dd651930100c575963f886411", 0x13}, {&(0x7f0000000040)="0000000035217f", 0x7}], 0x2) socket$netlink(0x10, 0x3, 0x8000000004) socket$netlink(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) socket$inet(0x2, 0x6, 0x1000) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500), 0x14b040, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffff3) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0xcc840000) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f0000000c80)='\x00\x00\x03\x01\x00\x00\x00\x1f\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x02\x00g\x00\x00\x00\x80\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-\xac\x99\xb8\xd2\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc4\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b^:4\xeb\xd37\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0HdO\xb9\xa2\x1d\x13\x8fCha\xb3\x95wl},\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80Z\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9\x13f=\xbd\x03\xe8\xbex:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13\xba\x00|g]7\xdc\xe9=\"\xe4\xb3\x0f\xc6\x8f\x85fGGV&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xd0d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146\'Z\x83H\xabF\x18<\x86h\x01=\x03\\\xc4\t\x8e/\x12\a\xdf\xe7zU\xcc\x02\x0e\xc1?\xeau\xb4\x84\x1b\xdaR-\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&@\x00\x00\x00rT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\xd7c\t(\xf2\x93\x8d\\\x91\xef\xab(Jck\xdf\xa3 \x16\x9bH=\x01\x7f\x02\x1dF3\x7f\xd15\xa8\xd2\x94\xa7\xe9\xbd\xdc\x16\xe1Z\x9c\xe3\xeb9\x8f\xfdC\x0e\xd3]\xb5\xfdB\\\xd2\xfe\xf6H\x8ai}kDM\xbd\xfcJ{T{@i/\xb7x\xef\x1f\xf0t\xf5\xaf\xb21F\x01\xe0\x86\xde\x88\xb8\x8f \xfc\xcd\xba\xea\x16\xc1J\xb7\xe3\x04m\x0e\xaf\xd6X\xba\x8a\xdb\xeda\x83.H\xe3\x86\x03\t\xcb\xdc\x80\xee\x0ec\x12\x8a\x92\x11\xb6\xcc#\x10\xec\xfd\xbb\xd3\\\xc8\x88\x04,\'\x14\xbf\x84\x16\xb3\x8f,6\xc6D\xae\xa1\xf9\xe7@\xac\xaa\x104\x8b\x8eQ8\x11\xa7|\x87\xe2\xccrj%\xc4r&\r\a\xa7\xda\xf5\'V\x89\xe6\xa4\x05\xde\xf5\xaa@\xec\xe2\xf6\xb5x\xa1w\n\xda\xf2\xd67\xc6%\x0f[sF\xb6\xaeS>\xe9^\xd4\xf03\xe9.\xc4\xd5\xe0\r\xa1Q\xa8\xf2\xa2`zs\'k\xd4pV\xab&%\xf8\x8a\x80\x9d\"\xf3\xcc\xd2i\xc8\xd8\xc6\xbeD\xda\x86?\xf9\x13\xe5L`R\xe8Vq\xa3\nD\x9f\xe4M\xe6\xab\xdd!=%\x06z$\x99\';O\xfc\xf0u\x83\v\x83\a8\xfe<\x9e\xa8\xfe\xca`D\x91\x81!QT$\x05T\x85\xd6\xe9!\xb9wfL\x12\xa8\xb0\xb0\x86\xc2\xa1\xf7\x05i\xf5\xf0\r\xe7h\xdaD\xcb\xd4\x87\x84\xe5\xc7r;.\xf0\xed\x17\x83Nn\xb7\x0f!u}J)\xa1\xa1\x16\xc5`Z,\xa3\xcf\xfdy\aH\x06\x14l\x92x\xdbB=\xcc\xcdf\xe5\x04=HQ\xeaE-v\x02\x0eY\x8e\xbf\xec\x16\xc4G\xea\x8bS\x8e\xd5f\xdcj\xe1\x86\xf9s\x90\xe5\xf9\x89\xc0\xf3\xcd;r4j]\x9b\xdf\xf5\xe9\x82\xe1\xdb\x11\xb3\b\xa2Y\xdb\\\xc1H\xc3\xcf\xb1W\xe9(\xee\x18\xca\xda\xf5p,\x16\xbc\x17\xfe\xd8\n\xe1\xa1&=+)\xf9Vd\x11\xf6hX\xbe\x85O=\xe2\x9f~I\xc4\"\xa9\xd9\x19\xa2\\\xb8>f\xe2Jh+u\x90\x13\x94\x12\xc8X\xd7\xb4\xf1JS0FN\xa0\xda\xb6ez`\x9a\xea\xcf^\xa5\x17{\v\xe8n\xe9 \xc0/D\t\x7f\xd8\xad\xf2e\xff\x8b\x16p\x0f\xe4\x1a/\xe1\x96\xd2\xae\x94\x0e5\xb0b+\xac\x14\xaa\xb0\xb7\xa5.\x15\x8a\xca\xb5~=D-\x90\xc1\xbf\x05\xb9\xd5\x86\xeb\xd2#\xda\xc132\'\xfc!%\x94\x1f\xbfL)\xc2c\xa8\xef\x152\x8d\xef\xde\xbe\xab\xf5g\x80\x02G>\xf5\x04a-\xff\x06X+\xc1\xd3\xb1\xcdn\x15p\xdf\xd8.\x89\x95{\xb6+:`\x9c\xcf2\x01\x1d1\xf7\xe6\x7f\x1f\xf5\xb0\xb9\t2\x14\x81\x99\xb8@7y\xb4\xce\xf1]\a\x03y\xc5F\xfa\xae\xd1Ov7\xa7\xc1\xb2.~B\xe8@G\xd1\xd9R~\x1b\xf7\xa8\x86\xa7\xc1\b\x9ej\x01\xf4\xb7\xd2\x0e\xc2\x15S\x19\xd7\xd4\xe6\xaf!\xf8_\x8aEOp@>4\xd7\xcf\x11\xe0;\x99}QmE\xdd\xa69)Q\x9e\xb9\'\x97\x9b\xe7\xa4?Ed\x9c\x7fE\xba5\x90\xc07\x96S\x9d\xe1\x84\xfa\x1a\xd6\x9a\x15\xd1o \xc0\xd28\x01\xa7\x99\x85q\xbd\x80\x00\x00\x00\x00\x00\x00\x00H\x0f\xbbT\xd5\xb3\xf4\xcd<\x8a\x01\x19\xd0|B\f0\xf8i\xd3\x1bJke\t\x8b7Q\x1dQ&\x96H\x05\xec\x80\xf0\xab\x8f\x94{\x9d+\xefs\x1c\xfck\xf7q\x10\xf6\x16\xbc\xe7\x93\x0f\x7f\xcd\xa7b\xbe\x88\xcc\xb6^\x93\xa9P\xf3\xa3\xe4Az=\xe0+Q\x9e\xb5\x01\xb3\xc1\xa8P0+\xc9\xa1\xdbU~J$\xa4\x03\x11\x1aa~\x9du\x8f\x8d\xbcI\x85k\xa0\xae\xf6\xa0\x94r\xfb\xe3\xaa\xd4\xf0\x99\x06\xe1i\x1f\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\\\xb2/R\xedI2e5\x88(\xc0+^\xe7G\x17\x03^\xd7g\xb9n\x8c2\xb3\x12\x91\x86b\t\xd0R\x01\xda$Y\x85\x02&\x95FC\xc8\xd9\x00\x00\x00\xb6u\xbb\n{\x90\xfd>\xd0-\xfa\xa9\xfd{\x95E\r\x81j\x12\xb7\xd0k\xc2\xdc\xcdK\xc1\xe6\xf7\xb8@\xe0D') (async) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f0000000c80)='\x00\x00\x03\x01\x00\x00\x00\x1f\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x02\x00g\x00\x00\x00\x80\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-\xac\x99\xb8\xd2\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc4\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b^:4\xeb\xd37\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0HdO\xb9\xa2\x1d\x13\x8fCha\xb3\x95wl},\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80Z\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9\x13f=\xbd\x03\xe8\xbex:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13\xba\x00|g]7\xdc\xe9=\"\xe4\xb3\x0f\xc6\x8f\x85fGGV&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xd0d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146\'Z\x83H\xabF\x18<\x86h\x01=\x03\\\xc4\t\x8e/\x12\a\xdf\xe7zU\xcc\x02\x0e\xc1?\xeau\xb4\x84\x1b\xdaR-\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&@\x00\x00\x00rT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\xd7c\t(\xf2\x93\x8d\\\x91\xef\xab(Jck\xdf\xa3 \x16\x9bH=\x01\x7f\x02\x1dF3\x7f\xd15\xa8\xd2\x94\xa7\xe9\xbd\xdc\x16\xe1Z\x9c\xe3\xeb9\x8f\xfdC\x0e\xd3]\xb5\xfdB\\\xd2\xfe\xf6H\x8ai}kDM\xbd\xfcJ{T{@i/\xb7x\xef\x1f\xf0t\xf5\xaf\xb21F\x01\xe0\x86\xde\x88\xb8\x8f \xfc\xcd\xba\xea\x16\xc1J\xb7\xe3\x04m\x0e\xaf\xd6X\xba\x8a\xdb\xeda\x83.H\xe3\x86\x03\t\xcb\xdc\x80\xee\x0ec\x12\x8a\x92\x11\xb6\xcc#\x10\xec\xfd\xbb\xd3\\\xc8\x88\x04,\'\x14\xbf\x84\x16\xb3\x8f,6\xc6D\xae\xa1\xf9\xe7@\xac\xaa\x104\x8b\x8eQ8\x11\xa7|\x87\xe2\xccrj%\xc4r&\r\a\xa7\xda\xf5\'V\x89\xe6\xa4\x05\xde\xf5\xaa@\xec\xe2\xf6\xb5x\xa1w\n\xda\xf2\xd67\xc6%\x0f[sF\xb6\xaeS>\xe9^\xd4\xf03\xe9.\xc4\xd5\xe0\r\xa1Q\xa8\xf2\xa2`zs\'k\xd4pV\xab&%\xf8\x8a\x80\x9d\"\xf3\xcc\xd2i\xc8\xd8\xc6\xbeD\xda\x86?\xf9\x13\xe5L`R\xe8Vq\xa3\nD\x9f\xe4M\xe6\xab\xdd!=%\x06z$\x99\';O\xfc\xf0u\x83\v\x83\a8\xfe<\x9e\xa8\xfe\xca`D\x91\x81!QT$\x05T\x85\xd6\xe9!\xb9wfL\x12\xa8\xb0\xb0\x86\xc2\xa1\xf7\x05i\xf5\xf0\r\xe7h\xdaD\xcb\xd4\x87\x84\xe5\xc7r;.\xf0\xed\x17\x83Nn\xb7\x0f!u}J)\xa1\xa1\x16\xc5`Z,\xa3\xcf\xfdy\aH\x06\x14l\x92x\xdbB=\xcc\xcdf\xe5\x04=HQ\xeaE-v\x02\x0eY\x8e\xbf\xec\x16\xc4G\xea\x8bS\x8e\xd5f\xdcj\xe1\x86\xf9s\x90\xe5\xf9\x89\xc0\xf3\xcd;r4j]\x9b\xdf\xf5\xe9\x82\xe1\xdb\x11\xb3\b\xa2Y\xdb\\\xc1H\xc3\xcf\xb1W\xe9(\xee\x18\xca\xda\xf5p,\x16\xbc\x17\xfe\xd8\n\xe1\xa1&=+)\xf9Vd\x11\xf6hX\xbe\x85O=\xe2\x9f~I\xc4\"\xa9\xd9\x19\xa2\\\xb8>f\xe2Jh+u\x90\x13\x94\x12\xc8X\xd7\xb4\xf1JS0FN\xa0\xda\xb6ez`\x9a\xea\xcf^\xa5\x17{\v\xe8n\xe9 \xc0/D\t\x7f\xd8\xad\xf2e\xff\x8b\x16p\x0f\xe4\x1a/\xe1\x96\xd2\xae\x94\x0e5\xb0b+\xac\x14\xaa\xb0\xb7\xa5.\x15\x8a\xca\xb5~=D-\x90\xc1\xbf\x05\xb9\xd5\x86\xeb\xd2#\xda\xc132\'\xfc!%\x94\x1f\xbfL)\xc2c\xa8\xef\x152\x8d\xef\xde\xbe\xab\xf5g\x80\x02G>\xf5\x04a-\xff\x06X+\xc1\xd3\xb1\xcdn\x15p\xdf\xd8.\x89\x95{\xb6+:`\x9c\xcf2\x01\x1d1\xf7\xe6\x7f\x1f\xf5\xb0\xb9\t2\x14\x81\x99\xb8@7y\xb4\xce\xf1]\a\x03y\xc5F\xfa\xae\xd1Ov7\xa7\xc1\xb2.~B\xe8@G\xd1\xd9R~\x1b\xf7\xa8\x86\xa7\xc1\b\x9ej\x01\xf4\xb7\xd2\x0e\xc2\x15S\x19\xd7\xd4\xe6\xaf!\xf8_\x8aEOp@>4\xd7\xcf\x11\xe0;\x99}QmE\xdd\xa69)Q\x9e\xb9\'\x97\x9b\xe7\xa4?Ed\x9c\x7fE\xba5\x90\xc07\x96S\x9d\xe1\x84\xfa\x1a\xd6\x9a\x15\xd1o \xc0\xd28\x01\xa7\x99\x85q\xbd\x80\x00\x00\x00\x00\x00\x00\x00H\x0f\xbbT\xd5\xb3\xf4\xcd<\x8a\x01\x19\xd0|B\f0\xf8i\xd3\x1bJke\t\x8b7Q\x1dQ&\x96H\x05\xec\x80\xf0\xab\x8f\x94{\x9d+\xefs\x1c\xfck\xf7q\x10\xf6\x16\xbc\xe7\x93\x0f\x7f\xcd\xa7b\xbe\x88\xcc\xb6^\x93\xa9P\xf3\xa3\xe4Az=\xe0+Q\x9e\xb5\x01\xb3\xc1\xa8P0+\xc9\xa1\xdbU~J$\xa4\x03\x11\x1aa~\x9du\x8f\x8d\xbcI\x85k\xa0\xae\xf6\xa0\x94r\xfb\xe3\xaa\xd4\xf0\x99\x06\xe1i\x1f\xfa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\\\xb2/R\xedI2e5\x88(\xc0+^\xe7G\x17\x03^\xd7g\xb9n\x8c2\xb3\x12\x91\x86b\t\xd0R\x01\xda$Y\x85\x02&\x95FC\xc8\xd9\x00\x00\x00\xb6u\xbb\n{\x90\xfd>\xd0-\xfa\xa9\xfd{\x95E\r\x81j\x12\xb7\xd0k\xc2\xdc\xcdK\xc1\xe6\xf7\xb8@\xe0D') ioctl$ASHMEM_SET_NAME(r1, 0x40087707, &(0x7f0000000040)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') (async) ioctl$ASHMEM_SET_NAME(r1, 0x40087707, &(0x7f0000000040)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') r2 = signalfd(r1, &(0x7f0000000000)={[0x97f]}, 0x8) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000080)={0xffffffffffffffff, 0x1, 0x1, 0x0, 0x20c}) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@index_on}, {@index_off}]}) (async) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@index_on}, {@index_off}]}) 6.18265321s ago: executing program 3 (id=1880): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000004800010000000000000000000a00806e0800000000150000140001800d2a79075827af5aa534d6815c2e93f10c000280", @ANYRES32], 0x3c}}, 0x0) 2.121579834s ago: executing program 0 (id=1881): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x5) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'ip6gretap0\x00', 0x0}) sendto$packet(r3, &(0x7f0000000180)="0b032200e0ff14000200475400f6a13bb10000a8880089064803", 0x10000, 0x0, &(0x7f0000000140)={0x11, 0x0, r4}, 0x14) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="ba4100b80300ef36f2abba42000fd7f00f20e06635000020000f22e0672e660f71d620f30763d7323200170fe4dfbaf80c66b898bbf38466efbbfc0ced", 0x3d}], 0x1, 0x70, &(0x7f0000000200)=[@vmwrite={0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x81a00000c}], 0x1) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r7, 0x0, 0x4, 0x1) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0xfffffd88) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) read$FUSE(r8, 0x0, 0x3) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r9, 0x0) ioctl$FUSE_DEV_IOC_BACKING_OPEN(r8, 0x4010e501, &(0x7f0000000000)={r9}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2.121375524s ago: executing program 1 (id=1882): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x22, 0xf, {[@local=@item_4={0x3, 0x2, 0x7, "1d0ee5d8"}, @local=@item_4={0x3, 0x2, 0x8, "4d501821"}, @global=@item_4={0x3, 0x1, 0x6, "80568cea"}]}}, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000340)={0x24, &(0x7f0000000100)={0x20, 0x21, 0x94, {0x94, 0x23, "facb812c32663c85adcb44b0ba9918c15a752a6ca8db5701a8ad4045469dc08f37386f69938f55eb09181f9d587c79b3127b4240aef56eb40c10f4106be790261adb70f413bb0bf3ffb2b056adb3e63ba4fde85d66d426d44095a2e496b45d5d216f10a520349e9b93713476311716ad88908d5045f9278c45296b78027d0e3973791ab60d6035cce75b40f0bc2170801fcb"}}, &(0x7f00000001c0)={0x0, 0x3, 0x64, @string={0x64, 0x3, "66e1387550d50b59df4058b1d6334dae51fb82b82fcac298b91ee0407907b6dadef93d4b6fce265967dc40b55fd23ee1908aa26fd20f0c32da4e86e18c18fb9ccf03521dd82fb638840387d07401b7d5df5f4ffc96398c194f1d40090425002599f6"}}, &(0x7f0000000240)={0x0, 0x22, 0x1d, {[@global=@item_012={0x2, 0x1, 0x4, "9c8c"}, @local=@item_012={0x2, 0x2, 0x2, '\'\a'}, @local=@item_4={0x3, 0x2, 0x5, "d2ff2427"}, @global=@item_4={0x3, 0x1, 0xa, "030fd762"}, @main=@item_4={0x3, 0x0, 0xa, "4cff9d39"}, @global=@item_012={0x2, 0x1, 0xb, "e588"}, @local=@item_4={0x3, 0x2, 0x0, "f34ec3e4"}]}}, &(0x7f0000000300)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4d, 0x8, 0x1, {0x22, 0xb80}}}}, &(0x7f0000000580)={0x2c, &(0x7f0000000380)={0x40, 0xa, 0x6c, "251a74121a2c7498282ef411d717f411596beed632d81dbad046204ac341c22f9391dc1d42bf54f29406bb5067a609f2469c70c8016e3bac2d59eb1609ee9dbc86e18f5cfcce92902d294c3890b102c4e0e4b0f14f058eb4b7d19f7c4bc5902c6578f7d3d9dc5a76c1c10ab1"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x5}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x5}, &(0x7f0000000480)={0x20, 0x1, 0xa4, "c9851f5ee27de295560ce4648d1cfa6a41711117611e08388b00edf551933c22fae636474487aec65ccf5d52014f62cfbf8669b0351cc931add7c22e284a3d341cb8a38bbf6daa5350f1f240979487fdeb157ce7a29ee32baf4c3375158cf7605bad5b0eb95378a0b10aaa232386f4acfa3c59ade7dba6c0fdaee3583e2b814212e78d2facaf39b1bbc7d4ef66e238be34d5df4fa84f1e3896b652c922e34d353ee82242"}, &(0x7f0000000540)={0x20, 0x3, 0x1, 0x7}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @multicast}) write$cgroup_int(r2, &(0x7f0000000680)=0x3ff, 0x12) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'batadv0\x00', 0x0}) sendto$packet(r2, &(0x7f00000005c0)="e0a5735411fff39876563492a96c0cd06e2a35aefa46", 0x16, 0x4010, &(0x7f0000000640)={0x11, 0x10, r3, 0x1, 0x5, 0x6, @multicast}, 0x14) r4 = syz_open_dev$hidraw(&(0x7f0000000280), 0x82, 0x2) ioctl$HIDIOCGFEATURE(r4, 0xc0404807, &(0x7f0000000000)={0x3, "ceed9d47f764deeebcda6eddf031d6b701e4c63d076c79c1a789634a569aa742481dc08de6ca5e7199aed315ebe7c568a06058830296ba6f95c50a6ade0eee5f"}) 2.120586284s ago: executing program 3 (id=1883): r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x20010, r0, 0x5385e000) (async) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000080)) (async) r2 = syz_kvm_setup_syzos_vm$x86(0xffffffffffffffff, &(0x7f0000c00000/0x400000)=nil) r3 = syz_kvm_add_vcpu$x86(r2, &(0x7f0000000200)={0x0, &(0x7f00000000c0)=[@code={0xa, 0x60, {"440f01f8b998080000b856000000ba000000000f300f20e035080000000f22e067460f09f336460f07420f79ff400f20c20f01f8440f20c0350f000000440f22c0b9800000c00f3235000100000f30"}}, @nested_create_vm={0x12d, 0x18}, @rdmsr={0x66, 0x18, {0x868}}, @in_dx={0x69, 0x20, {0xd273, 0x6}}, @rdmsr={0x66, 0x18, {0xb96}}, @nested_amd_invlpga={0x17d, 0x20, {0x2, 0xf133}}, @wr_drn={0x68, 0x20, {0x2, 0x1ff}}, @nested_amd_vmload={0x182, 0x18, 0x1}, @wr_crn={0x67, 0x20, {0x4, 0x4}}], 0x140}) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000240)={0x8, 0x0, [{0x4, 0x7e9a, 0x7, 0x6, 0x1, 0xa, 0x1}, {0x80000000, 0xf92, 0x4, 0x7, 0x3, 0x4, 0xffff}, {0x2, 0x962, 0x5, 0x3, 0x4, 0x6, 0xb3}, {0x80000019, 0x7ff, 0x5, 0x6, 0x7, 0x9, 0x1}, {0xc0000001, 0x7fff, 0x3, 0xfffffdaa, 0x5, 0x0, 0x3}, {0x2, 0x5, 0x2, 0x7, 0x2, 0x9, 0x7}, {0x80000008, 0x3, 0x6, 0xffffff12, 0x6, 0x2, 0x8}, {0xc0000001, 0x7, 0x6, 0x7ff, 0xae, 0x9, 0x2}]}) ioctl$F2FS_IOC_GET_PIN_FILE(r3, 0x8004f50e, &(0x7f00000003c0)) (async) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000400)={{&(0x7f0000ec6000/0x2000)=nil, 0x2000}}) (async) r4 = accept$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @private}, &(0x7f0000000480)=0x10) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000580), r4) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r6, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48840}, 0x20000000) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680), 0x400040, 0x0) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000700)={0x6, &(0x7f00000006c0)=[{0x7, 0x0, 0x3, 0x2}, {0x1ff, 0x81, 0x1, 0x7}, {0x6, 0x6, 0x1, 0x1}, {0x80, 0x2, 0x80, 0x1}, {0x8, 0x4, 0x1, 0x6}, {0xffff, 0x7, 0x7}]}) (async, rerun: 32) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000740)) (rerun: 32) ioctl(r1, 0x1000, &(0x7f0000000b40)="5ce881f00f59fd") syz_open_procfs$pagemap(0x0, &(0x7f0000000b80)) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r8, &(0x7f0000000bc0)={0x1, @read_stored_link_key={{0xc0d, 0x7}, {@none, 0x4}}}, 0xb) (async) ioctl$KVM_RUN(r3, 0xae80, 0x0) (async, rerun: 32) openat$kvm(0xffffffffffffff9c, &(0x7f0000000c00), 0x200001, 0x0) (async, rerun: 32) ioctl(r1, 0xff800000, &(0x7f0000000c40)="cf837121c3ca2a4fa178d49bb219f4220a877782d5b8f7d844aab7e2844f5b07a5b8bed2eb4d4d61d4c473e826e1d742dc5ea5ec6291416ac8c038a0f6c4eec4b4326ceed3a54b3dd73ca19c229f7e5f6f0895a2bea3da83e999a34f8a7f9e25511df411f56231f58461ba") (async) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000d00), r5) sendmsg$DEVLINK_CMD_RATE_GET(r5, &(0x7f0000000e40)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000e00)={&(0x7f0000000d40)={0xa4, r9, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @handle=@pci={{0x8}, {0x11}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20008804}, 0x8804) (async) r10 = epoll_create1(0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0xffffffffffffffff, 0x7, r3, &(0x7f0000000e80)={r10, r3, 0xfffffff8}) sendmsg$TIPC_CMD_RESET_LINK_STATS(r5, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x30, 0x0, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x801}, 0xc4) (async) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) 14.58276ms ago: executing program 0 (id=1884): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r3, 0x1, 0x2a, &(0x7f0000000100)=0xfffe, 0x4) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket(0xa, 0x801, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, 0x0) getsockopt(r4, 0x0, 0x40, 0x0, &(0x7f00000000c0)=0x54) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000240)="3d4077e50823a7746c0ee30dd0afdfb5ff2a258d495dc9d2c2a25bc7dc0b11bde0d15d0770675db17901", 0x2a}, {&(0x7f0000000080)="b28231adddba8ed6f23bf98ca8caa015ab797f57", 0x14}], 0x2, 0x0) recvmmsg(r3, &(0x7f0000001440)=[{{&(0x7f0000000280)=@un=@abs, 0x0, &(0x7f0000001400)=[{&(0x7f0000001480)=""/1}, {&(0x7f0000000300)=""/102}, {&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/111}]}}], 0x700, 0x40002002, 0x0) write$binfmt_misc(r2, &(0x7f0000000040), 0xffc1) fadvise64(r0, 0x7, 0x5, 0x1) setsockopt$sock_int(r3, 0x1, 0x10, &(0x7f0000000180)=0x55b7, 0x4) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x10, 0x0) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000300)='./file0\x00', 0x2000800) setxattr$incfs_metadata(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0), 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.metadata\x00') 14.34523ms ago: executing program 1 (id=1885): prlimit64(0x0, 0xe, 0x0, 0x0) setrlimit(0x3, &(0x7f0000000000)) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x78c}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000040), &(0x7f0000048000)=0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000309, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x1000000, 0x0, 0xfffffd11, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) 0s ago: executing program 3 (id=1886): sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="20000000010101014ac84ac4da64565c020000070c001980080001"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="a400000054000100000000000000800007"], 0xa4}], 0x1, 0x0, 0x0, 0x4000001}, 0x0) r1 = syz_init_net_socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, 0x0, 0x0) kernel console output (not intermixed with test programs): 21.275231][ T3158] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 121.275252][ T3158] dump_stack+0x19/0x20 [ 121.275270][ T3158] should_fail_ex+0x3d7/0x530 [ 121.275292][ T3158] should_fail_alloc_page+0xec/0x110 [ 121.275308][ T3158] __alloc_pages_noprof+0x1c0/0x7e0 [ 121.275326][ T3158] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 121.275348][ T3158] __folio_alloc_noprof+0x14/0x80 [ 121.275366][ T3158] folio_prealloc+0x46/0x220 [ 121.275383][ T3158] do_pte_missing+0x1e80/0x44f0 [ 121.275399][ T3158] ? _raw_spin_unlock+0x45/0x60 [ 121.275422][ T3158] ? pte_marker_clear+0x1b0/0x1b0 [ 121.275439][ T3158] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 121.275464][ T3158] ? __pte_offset_map+0x1b0/0x230 [ 121.275484][ T3158] ? pte_offset_map_rw_nolock+0xba/0x110 [ 121.275505][ T3158] handle_mm_fault+0x11b8/0x1bf0 [ 121.275528][ T3158] ? __kasan_check_write+0x18/0x20 [ 121.275551][ T3158] ? __cfi_handle_mm_fault+0x10/0x10 [ 121.275574][ T3158] ? follow_page_pte+0x4b9/0xbc0 [ 121.275592][ T3158] ? gup_must_unshare+0x1e0/0x1e0 [ 121.275609][ T3158] ? vma_is_secretmem+0x11/0x50 [ 121.275629][ T3158] __get_user_pages+0x1170/0x22b0 [ 121.275649][ T3158] ? populate_vma_page_range+0x220/0x220 [ 121.275666][ T3158] ? down_read+0x7f/0xe0 [ 121.275682][ T3158] ? __cfi_down_read+0x10/0x10 [ 121.275699][ T3158] __mm_populate+0x2f8/0x430 [ 121.275717][ T3158] do_mlock+0x7eb/0xa00 [ 121.275737][ T3158] ? fput+0x1a4/0x240 [ 121.275754][ T3158] ? lru_gen_add_folio+0x860/0x860 [ 121.275772][ T3158] ? ksys_write+0x1f3/0x260 [ 121.275793][ T3158] ? __cfi_ksys_write+0x10/0x10 [ 121.275815][ T3158] ? __kasan_check_read+0x15/0x20 [ 121.275837][ T3158] __x64_sys_mlock+0x64/0x80 [ 121.275855][ T3158] x64_sys_call+0x670/0x2ee0 [ 121.275877][ T3158] do_syscall_64+0x57/0xf0 [ 121.275897][ T3158] ? clear_bhb_loop+0x50/0xa0 [ 121.275918][ T3158] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 121.275945][ T3158] RIP: 0033:0x7f44ae99c799 [ 121.275962][ T3158] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.275976][ T3158] RSP: 002b:00007f44af8d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 121.275997][ T3158] RAX: ffffffffffffffda RBX: 00007f44aec15fa0 RCX: 00007f44ae99c799 [ 121.276013][ T3158] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 121.276026][ T3158] RBP: 00007f44af8d6090 R08: 0000000000000000 R09: 0000000000000000 [ 121.276039][ T3158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 121.276051][ T3158] R13: 00007f44aec16038 R14: 00007f44aec15fa0 R15: 00007ffd9b52ca48 [ 121.276066][ T3158] [ 121.382191][ T3169] netlink: 'syz.1.1092': attribute type 12 has an invalid length. [ 121.385699][ T36] audit: type=1400 audit(2000000020.266:2332): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.839700][ T36] audit: type=1400 audit(2000000020.284:2333): avc: denied { read write } for pid=3147 comm="syz.2.1083" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 121.840350][ T3169] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.870802][ T36] audit: type=1400 audit(2000000020.284:2334): avc: denied { mounton } for pid=3147 comm="syz.2.1083" path="/276/file0" dev="tmpfs" ino=1500 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 121.896882][ T36] audit: type=1400 audit(2000000020.322:2335): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.922146][ T36] audit: type=1400 audit(2000000020.322:2336): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.946510][ T36] audit: type=1400 audit(2000000020.322:2337): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.972130][ T3183] FAULT_INJECTION: forcing a failure. [ 121.972130][ T3183] name failslab, interval 1, probability 0, space 0, times 0 [ 121.990679][ T3183] CPU: 1 UID: 0 PID: 3183 Comm: syz.2.1099 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 121.990719][ T3183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 121.990731][ T3183] Call Trace: [ 121.990737][ T3183] [ 121.990746][ T3183] __dump_stack+0x21/0x30 [ 121.990774][ T3183] dump_stack_lvl+0x140/0x1c0 [ 121.990796][ T3183] ? __cfi_dump_stack_lvl+0x10/0x10 [ 121.990819][ T3183] dump_stack+0x19/0x20 [ 121.990840][ T3183] should_fail_ex+0x3d7/0x530 [ 121.990862][ T3183] ? kernfs_fop_write_iter+0x162/0x510 [ 121.990884][ T3183] should_failslab+0xac/0x100 [ 121.990902][ T3183] __kmalloc_noprof+0x69/0x500 [ 121.990924][ T3183] ? splice_from_pipe_next+0x60a/0x660 [ 121.990946][ T3183] ? kernfs_fop_write_iter+0x162/0x510 [ 121.990963][ T3183] kernfs_fop_write_iter+0x162/0x510 [ 121.990979][ T3183] iter_file_splice_write+0x9ae/0x1200 [ 121.990997][ T3183] ? __cfi_iter_file_splice_write+0x10/0x10 [ 121.991015][ T3183] ? __kmalloc_noprof+0x261/0x500 [ 121.991037][ T3183] ? __cfi_iter_file_splice_write+0x10/0x10 [ 121.991055][ T3183] direct_splice_actor+0x276/0x4b0 [ 121.991074][ T3183] splice_direct_to_actor+0x4fd/0xbe0 [ 121.991095][ T3183] ? __cfi_direct_splice_actor+0x10/0x10 [ 121.991114][ T3183] ? __cfi_splice_direct_to_actor+0x10/0x10 [ 121.991134][ T3183] do_splice_direct+0x196/0x290 [ 121.991153][ T3183] ? __cfi_do_splice_direct+0x10/0x10 [ 121.991171][ T3183] ? __cfi_direct_file_splice_eof+0x10/0x10 [ 121.991191][ T3183] ? security_file_permission+0x38/0xf0 [ 121.991212][ T3183] ? rw_verify_area+0xac/0x230 [ 121.991233][ T3183] do_sendfile+0x5ef/0xf70 [ 121.991248][ T3183] ? vfs_writev+0xe50/0xe50 [ 121.991263][ T3183] ? __kasan_check_write+0x18/0x20 [ 121.991286][ T3183] ? __kasan_check_write+0x18/0x20 [ 121.991309][ T3183] __x64_sys_sendfile64+0x14a/0x200 [ 121.991327][ T3183] ? __cfi___x64_sys_sendfile64+0x10/0x10 [ 121.991353][ T3183] ? __kasan_check_read+0x15/0x20 [ 121.991376][ T3183] x64_sys_call+0xa26/0x2ee0 [ 121.991399][ T3183] do_syscall_64+0x57/0xf0 [ 121.991422][ T3183] ? clear_bhb_loop+0x50/0xa0 [ 121.991445][ T3183] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 121.991467][ T3183] RIP: 0033:0x7fed23b9c799 [ 121.991483][ T3183] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.991500][ T3183] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 121.991522][ T3183] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 121.991537][ T3183] RDX: 0000200000000080 RSI: 0000000000000003 RDI: 0000000000000004 [ 121.991550][ T3183] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 121.991563][ T3183] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 121.991576][ T3183] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 121.991594][ T3183] [ 122.274583][ T3187] netlink: 'syz.3.1100': attribute type 4 has an invalid length. [ 122.282553][ T3187] netlink: 'syz.3.1100': attribute type 5 has an invalid length. [ 122.290384][ T3187] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.1100'. [ 122.314357][ T3201] FAULT_INJECTION: forcing a failure. [ 122.314357][ T3201] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 122.327799][ T3201] CPU: 0 UID: 0 PID: 3201 Comm: syz.1.1104 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 122.327831][ T3201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 122.327844][ T3201] Call Trace: [ 122.327850][ T3201] [ 122.327858][ T3201] __dump_stack+0x21/0x30 [ 122.327896][ T3201] dump_stack_lvl+0x140/0x1c0 [ 122.327917][ T3201] ? __cfi_dump_stack_lvl+0x10/0x10 [ 122.327940][ T3201] ? check_stack_object+0x12b/0x150 [ 122.327964][ T3201] dump_stack+0x19/0x20 [ 122.327985][ T3201] should_fail_ex+0x3d7/0x530 [ 122.328007][ T3201] should_fail+0xf/0x20 [ 122.328027][ T3201] should_fail_usercopy+0x1e/0x30 [ 122.328050][ T3201] _copy_to_user+0x24/0xa0 [ 122.328075][ T3201] simple_read_from_buffer+0xed/0x160 [ 122.328095][ T3201] proc_fail_nth_read+0x1aa/0x220 [ 122.328116][ T3201] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 122.328137][ T3201] ? bpf_lsm_file_permission+0xd/0x20 [ 122.328155][ T3201] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 122.328173][ T3201] vfs_read+0x289/0xcb0 [ 122.328195][ T3201] ? __cfi_vfs_read+0x10/0x10 [ 122.328217][ T3201] ? __kasan_check_write+0x18/0x20 [ 122.328240][ T3201] ? mutex_lock+0x97/0x1d0 [ 122.328266][ T3201] ? __cfi_mutex_lock+0x10/0x10 [ 122.328290][ T3201] ? __fget_files+0x2c5/0x340 [ 122.328316][ T3201] ksys_read+0x145/0x260 [ 122.328338][ T3201] ? __cfi_ksys_read+0x10/0x10 [ 122.328360][ T3201] ? __kasan_check_write+0x18/0x20 [ 122.328382][ T3201] ? fpregs_restore_userregs+0x11c/0x260 [ 122.328403][ T3201] __x64_sys_read+0x7f/0x90 [ 122.328426][ T3201] x64_sys_call+0x2638/0x2ee0 [ 122.328449][ T3201] do_syscall_64+0x57/0xf0 [ 122.328471][ T3201] ? clear_bhb_loop+0x50/0xa0 [ 122.328494][ T3201] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 122.328515][ T3201] RIP: 0033:0x7fb58095cfce [ 122.328532][ T3201] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 122.328547][ T3201] RSP: 002b:00007fb5817c8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 122.328568][ T3201] RAX: ffffffffffffffda RBX: 00007fb5817c96c0 RCX: 00007fb58095cfce [ 122.328584][ T3201] RDX: 000000000000000f RSI: 00007fb5817c90a0 RDI: 0000000000000003 [ 122.328596][ T3201] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 122.328610][ T3201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.328622][ T3201] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 122.328638][ T3201] [ 122.596871][ T3208] FAULT_INJECTION: forcing a failure. [ 122.596871][ T3208] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 122.610608][ T3208] CPU: 0 UID: 0 PID: 3208 Comm: syz.2.1107 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 122.610721][ T3208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 122.610733][ T3208] Call Trace: [ 122.610739][ T3208] [ 122.610747][ T3208] __dump_stack+0x21/0x30 [ 122.610774][ T3208] dump_stack_lvl+0x140/0x1c0 [ 122.610796][ T3208] ? __cfi_dump_stack_lvl+0x10/0x10 [ 122.610818][ T3208] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 122.610840][ T3208] dump_stack+0x19/0x20 [ 122.610860][ T3208] should_fail_ex+0x3d7/0x530 [ 122.610881][ T3208] should_fail_alloc_page+0xec/0x110 [ 122.610897][ T3208] __alloc_pages_noprof+0x1c0/0x7e0 [ 122.610916][ T3208] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 122.610934][ T3208] ? update_curr+0xf8/0x9e0 [ 122.610959][ T3208] ? __kasan_check_read+0x15/0x20 [ 122.610982][ T3208] ? __perf_event_task_sched_in+0x1190/0x1370 [ 122.611009][ T3208] __folio_alloc_noprof+0x14/0x80 [ 122.611030][ T3208] folio_prealloc+0x46/0x220 [ 122.611049][ T3208] do_pte_missing+0x1e80/0x44f0 [ 122.611068][ T3208] ? psi_task_switch+0xad/0xa10 [ 122.611092][ T3208] ? pte_marker_clear+0x1b0/0x1b0 [ 122.611110][ T3208] ? __schedule+0x1357/0x1ea0 [ 122.611135][ T3208] ? __pte_offset_map+0x1b0/0x230 [ 122.611155][ T3208] ? pte_offset_map_rw_nolock+0xba/0x110 [ 122.611178][ T3208] handle_mm_fault+0x11b8/0x1bf0 [ 122.611202][ T3208] ? __kasan_check_write+0x18/0x20 [ 122.611228][ T3208] ? __cfi_handle_mm_fault+0x10/0x10 [ 122.611253][ T3208] ? follow_page_pte+0x4b9/0xbc0 [ 122.611274][ T3208] ? gup_must_unshare+0x1e0/0x1e0 [ 122.611294][ T3208] ? vma_pgtable_walk_end+0xd/0x30 [ 122.611313][ T3208] __get_user_pages+0x1170/0x22b0 [ 122.611336][ T3208] ? populate_vma_page_range+0x220/0x220 [ 122.611354][ T3208] ? down_read+0x7f/0xe0 [ 122.611372][ T3208] ? __cfi_down_read+0x10/0x10 [ 122.611391][ T3208] __mm_populate+0x2f8/0x430 [ 122.611410][ T3208] do_mlock+0x7eb/0xa00 [ 122.611430][ T3208] ? fput+0x1a4/0x240 [ 122.611449][ T3208] ? lru_gen_add_folio+0x860/0x860 [ 122.611468][ T3208] ? ksys_write+0x1f3/0x260 [ 122.611491][ T3208] ? __cfi_ksys_write+0x10/0x10 [ 122.611514][ T3208] ? __kasan_check_read+0x15/0x20 [ 122.611537][ T3208] __x64_sys_mlock+0x64/0x80 [ 122.611557][ T3208] x64_sys_call+0x670/0x2ee0 [ 122.611581][ T3208] do_syscall_64+0x57/0xf0 [ 122.611602][ T3208] ? clear_bhb_loop+0x50/0xa0 [ 122.611633][ T3208] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 122.611656][ T3208] RIP: 0033:0x7fed23b9c799 [ 122.611673][ T3208] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 122.611689][ T3208] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 122.611710][ T3208] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 122.611725][ T3208] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 122.611737][ T3208] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 122.611748][ T3208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 122.611759][ T3208] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 122.611774][ T3208] [ 123.036972][ T3227] FAULT_INJECTION: forcing a failure. [ 123.036972][ T3227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.050300][ T3227] CPU: 1 UID: 0 PID: 3227 Comm: syz.2.1116 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 123.050331][ T3227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 123.050344][ T3227] Call Trace: [ 123.050351][ T3227] [ 123.050359][ T3227] __dump_stack+0x21/0x30 [ 123.050388][ T3227] dump_stack_lvl+0x140/0x1c0 [ 123.050411][ T3227] ? __cfi_dump_stack_lvl+0x10/0x10 [ 123.050433][ T3227] ? check_stack_object+0x12b/0x150 [ 123.050459][ T3227] dump_stack+0x19/0x20 [ 123.050479][ T3227] should_fail_ex+0x3d7/0x530 [ 123.050502][ T3227] should_fail+0xf/0x20 [ 123.050522][ T3227] should_fail_usercopy+0x1e/0x30 [ 123.050545][ T3227] _copy_to_user+0x24/0xa0 [ 123.050569][ T3227] simple_read_from_buffer+0xed/0x160 [ 123.050589][ T3227] proc_fail_nth_read+0x1aa/0x220 [ 123.050608][ T3227] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 123.050623][ T3227] ? do_splice_direct+0x1d0/0x290 [ 123.050638][ T3227] ? bpf_lsm_file_permission+0xd/0x20 [ 123.050657][ T3227] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 123.050678][ T3227] vfs_read+0x289/0xcb0 [ 123.050699][ T3227] ? __kasan_check_write+0x18/0x20 [ 123.050722][ T3227] ? __cfi_vfs_read+0x10/0x10 [ 123.050744][ T3227] ? __kasan_check_write+0x18/0x20 [ 123.050766][ T3227] ? mutex_lock+0x97/0x1d0 [ 123.050791][ T3227] ? __cfi_mutex_lock+0x10/0x10 [ 123.050816][ T3227] ? __fget_files+0x2c5/0x340 [ 123.050841][ T3227] ksys_read+0x145/0x260 [ 123.050873][ T3227] ? __kasan_check_write+0x18/0x20 [ 123.050895][ T3227] ? __cfi_ksys_read+0x10/0x10 [ 123.050916][ T3227] ? __x64_sys_sendfile64+0x170/0x200 [ 123.050934][ T3227] ? __kasan_check_read+0x15/0x20 [ 123.050957][ T3227] __x64_sys_read+0x7f/0x90 [ 123.050980][ T3227] x64_sys_call+0x2638/0x2ee0 [ 123.051004][ T3227] do_syscall_64+0x57/0xf0 [ 123.051025][ T3227] ? clear_bhb_loop+0x50/0xa0 [ 123.051049][ T3227] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 123.051072][ T3227] RIP: 0033:0x7fed23b5cfce [ 123.051089][ T3227] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 123.051105][ T3227] RSP: 002b:00007fed24a78fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 123.051127][ T3227] RAX: ffffffffffffffda RBX: 00007fed24a796c0 RCX: 00007fed23b5cfce [ 123.051142][ T3227] RDX: 000000000000000f RSI: 00007fed24a790a0 RDI: 0000000000000005 [ 123.051155][ T3227] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 123.051168][ T3227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.051181][ T3227] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 123.051197][ T3227] [ 123.376267][ T3236] FAULT_INJECTION: forcing a failure. [ 123.376267][ T3236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 123.389591][ T3236] CPU: 0 UID: 0 PID: 3236 Comm: syz.2.1120 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 123.389622][ T3236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 123.389634][ T3236] Call Trace: [ 123.389642][ T3236] [ 123.389651][ T3236] __dump_stack+0x21/0x30 [ 123.389676][ T3236] dump_stack_lvl+0x140/0x1c0 [ 123.389688][ T3236] ? __cfi_dump_stack_lvl+0x10/0x10 [ 123.389702][ T3236] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 123.389715][ T3236] dump_stack+0x19/0x20 [ 123.389727][ T3236] should_fail_ex+0x3d7/0x530 [ 123.389739][ T3236] should_fail_alloc_page+0xec/0x110 [ 123.389750][ T3236] __alloc_pages_noprof+0x1c0/0x7e0 [ 123.389761][ T3236] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 123.389774][ T3236] __folio_alloc_noprof+0x14/0x80 [ 123.389786][ T3236] folio_prealloc+0x46/0x220 [ 123.389796][ T3236] do_pte_missing+0x1e80/0x44f0 [ 123.389807][ T3236] ? _raw_spin_unlock+0x45/0x60 [ 123.389821][ T3236] ? pte_marker_clear+0x1b0/0x1b0 [ 123.389839][ T3236] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 123.389856][ T3236] ? walk_pgd_range+0x1b58/0x1c20 [ 123.389869][ T3236] ? __pte_offset_map+0x1b0/0x230 [ 123.389881][ T3236] ? pte_offset_map_rw_nolock+0xba/0x110 [ 123.389898][ T3236] handle_mm_fault+0x11b8/0x1bf0 [ 123.389914][ T3236] ? __kasan_check_write+0x18/0x20 [ 123.389929][ T3236] ? __cfi_handle_mm_fault+0x10/0x10 [ 123.389944][ T3236] ? follow_page_pte+0x4b9/0xbc0 [ 123.389956][ T3236] ? gup_must_unshare+0x1e0/0x1e0 [ 123.389966][ T3236] ? vma_is_secretmem+0x11/0x50 [ 123.389978][ T3236] __get_user_pages+0x1170/0x22b0 [ 123.389991][ T3236] ? populate_vma_page_range+0x220/0x220 [ 123.390001][ T3236] ? down_read+0x7f/0xe0 [ 123.390011][ T3236] ? __cfi_down_read+0x10/0x10 [ 123.390021][ T3236] __mm_populate+0x2f8/0x430 [ 123.390032][ T3236] do_mlock+0x7eb/0xa00 [ 123.390043][ T3236] ? fput+0x1a4/0x240 [ 123.390054][ T3236] ? lru_gen_add_folio+0x860/0x860 [ 123.390065][ T3236] ? ksys_write+0x1f3/0x260 [ 123.390078][ T3236] ? __cfi_ksys_write+0x10/0x10 [ 123.390091][ T3236] ? __kasan_check_read+0x15/0x20 [ 123.390104][ T3236] __x64_sys_mlock+0x64/0x80 [ 123.390115][ T3236] x64_sys_call+0x670/0x2ee0 [ 123.390129][ T3236] do_syscall_64+0x57/0xf0 [ 123.390141][ T3236] ? clear_bhb_loop+0x50/0xa0 [ 123.390155][ T3236] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 123.390168][ T3236] RIP: 0033:0x7fed23b9c799 [ 123.390177][ T3236] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 123.390187][ T3236] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 123.390200][ T3236] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 123.390208][ T3236] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 123.390216][ T3236] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 123.390223][ T3236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.390230][ T3236] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 123.390239][ T3236] [ 123.814461][ T3243] GUP no longer grows the stack in syz.0.1123 (3243): 200000005000-200000008000 (200000004000) [ 123.824993][ T3243] CPU: 0 UID: 0 PID: 3243 Comm: syz.0.1123 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 123.825025][ T3243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 123.825039][ T3243] Call Trace: [ 123.825048][ T3243] [ 123.825057][ T3243] __dump_stack+0x21/0x30 [ 123.825086][ T3243] dump_stack_lvl+0x140/0x1c0 [ 123.825100][ T3243] ? __cfi_dump_stack_lvl+0x10/0x10 [ 123.825113][ T3243] ? futex_lock_pi_atomic+0xe3/0xcd0 [ 123.825129][ T3243] dump_stack+0x19/0x20 [ 123.825140][ T3243] fixup_user_fault+0x62a/0x6b0 [ 123.825152][ T3243] fault_in_user_writeable+0x75/0xe0 [ 123.825163][ T3243] futex_lock_pi+0x2d7/0xa70 [ 123.825176][ T3243] ? __cfi_futex_lock_pi+0x10/0x10 [ 123.825189][ T3243] ? __cfi_futex_wake_mark+0x10/0x10 [ 123.825202][ T3243] ? futex_setup_timer+0xb4/0xd0 [ 123.825213][ T3243] ? __cfi_futex_wake_mark+0x10/0x10 [ 123.825226][ T3243] ? __cfi_userfaultfd_unmap_complete+0x10/0x10 [ 123.825241][ T3243] ? mas_find+0x358/0x5f0 [ 123.825253][ T3243] do_futex+0x270/0x510 [ 123.825263][ T3243] ? do_vmi_munmap+0x245/0x2e0 [ 123.825277][ T3243] ? __cfi_do_futex+0x10/0x10 [ 123.825288][ T3243] ? __vm_munmap+0x2de/0x390 [ 123.825302][ T3243] __se_sys_futex+0x13c/0x320 [ 123.825313][ T3243] ? __x64_sys_futex+0x110/0x110 [ 123.825325][ T3243] ? __kasan_check_write+0x18/0x20 [ 123.825340][ T3243] __x64_sys_futex+0xe9/0x110 [ 123.825352][ T3243] x64_sys_call+0x227f/0x2ee0 [ 123.825367][ T3243] do_syscall_64+0x57/0xf0 [ 123.825379][ T3243] ? clear_bhb_loop+0x50/0xa0 [ 123.825391][ T3243] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 123.825404][ T3243] RIP: 0033:0x7fee14f9c799 [ 123.825414][ T3243] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 123.825423][ T3243] RSP: 002b:00007fee15f1f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 123.825436][ T3243] RAX: ffffffffffffffda RBX: 00007fee15215fa0 RCX: 00007fee14f9c799 [ 123.825444][ T3243] RDX: 0000000000000000 RSI: 000000000000008d RDI: 0000200000004000 [ 123.825451][ T3243] RBP: 00007fee15032c99 R08: 0000000000000000 R09: 0000000000000000 [ 123.825458][ T3243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 123.825464][ T3243] R13: 00007fee15216038 R14: 00007fee15215fa0 R15: 00007ffcfe175b08 [ 123.825473][ T3243] [ 124.884198][ T3281] netlink: 'syz.3.1139': attribute type 27 has an invalid length. [ 125.449853][ T329] Bluetooth: hci1: Frame reassembly failed (-84) [ 125.456764][ T329] Bluetooth: hci1: Frame reassembly failed (-84) [ 125.458525][ T3297] netlink: 'syz.3.1146': attribute type 3 has an invalid length. [ 125.463243][ T329] Bluetooth: hci1: Frame reassembly failed (-84) [ 126.501150][ T36] kauditd_printk_skb: 245 callbacks suppressed [ 126.501171][ T36] audit: type=1400 audit(2000000025.323:2583): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.519422][ T3321] FAULT_INJECTION: forcing a failure. [ 126.519422][ T3321] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 126.532090][ T36] audit: type=1400 audit(2000000025.323:2584): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.545343][ T3321] CPU: 1 UID: 0 PID: 3321 Comm: syz.2.1156 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 126.545375][ T3321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 126.545388][ T3321] Call Trace: [ 126.545395][ T3321] [ 126.545403][ T3321] __dump_stack+0x21/0x30 [ 126.545433][ T3321] dump_stack_lvl+0x140/0x1c0 [ 126.545455][ T3321] ? __cfi_dump_stack_lvl+0x10/0x10 [ 126.545476][ T3321] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 126.545499][ T3321] dump_stack+0x19/0x20 [ 126.545518][ T3321] should_fail_ex+0x3d7/0x530 [ 126.545549][ T3321] should_fail_alloc_page+0xec/0x110 [ 126.545567][ T3321] __alloc_pages_noprof+0x1c0/0x7e0 [ 126.545586][ T3321] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 126.545609][ T3321] __folio_alloc_noprof+0x14/0x80 [ 126.545628][ T3321] folio_prealloc+0x46/0x220 [ 126.545646][ T3321] do_pte_missing+0x1e80/0x44f0 [ 126.545664][ T3321] ? _raw_spin_unlock+0x45/0x60 [ 126.545689][ T3321] ? pte_marker_clear+0x1b0/0x1b0 [ 126.545706][ T3321] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 126.545734][ T3321] ? __pte_offset_map+0x1b0/0x230 [ 126.545757][ T3321] ? pte_offset_map_rw_nolock+0xba/0x110 [ 126.545777][ T3321] handle_mm_fault+0x11b8/0x1bf0 [ 126.545803][ T3321] ? __kasan_check_write+0x18/0x20 [ 126.545827][ T3321] ? __cfi_handle_mm_fault+0x10/0x10 [ 126.545851][ T3321] ? follow_page_pte+0x4b9/0xbc0 [ 126.545870][ T3321] ? gup_must_unshare+0x1e0/0x1e0 [ 126.545888][ T3321] ? vma_is_secretmem+0x11/0x50 [ 126.545909][ T3321] __get_user_pages+0x1170/0x22b0 [ 126.545930][ T3321] ? populate_vma_page_range+0x220/0x220 [ 126.545948][ T3321] ? down_read+0x7f/0xe0 [ 126.545965][ T3321] ? __cfi_down_read+0x10/0x10 [ 126.545982][ T3321] __mm_populate+0x2f8/0x430 [ 126.546004][ T3321] do_mlock+0x7eb/0xa00 [ 126.546024][ T3321] ? fput+0x1a4/0x240 [ 126.546041][ T3321] ? lru_gen_add_folio+0x860/0x860 [ 126.546060][ T3321] ? ksys_write+0x1f3/0x260 [ 126.546082][ T3321] ? __cfi_ksys_write+0x10/0x10 [ 126.546103][ T3321] ? __kasan_check_read+0x15/0x20 [ 126.546123][ T3321] __x64_sys_mlock+0x64/0x80 [ 126.546141][ T3321] x64_sys_call+0x670/0x2ee0 [ 126.546164][ T3321] do_syscall_64+0x57/0xf0 [ 126.546184][ T3321] ? clear_bhb_loop+0x50/0xa0 [ 126.546208][ T3321] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 126.546228][ T3321] RIP: 0033:0x7fed23b9c799 [ 126.546246][ T3321] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 126.546261][ T3321] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 126.546283][ T3321] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 126.546297][ T3321] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 126.546309][ T3321] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 126.546322][ T3321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.546334][ T3321] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 126.546349][ T3321] [ 126.865393][ T36] audit: type=1400 audit(2000000025.323:2585): avc: denied { execmem } for pid=3320 comm="syz.2.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 126.884967][ T36] audit: type=1400 audit(2000000025.398:2586): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.909067][ T36] audit: type=1400 audit(2000000025.408:2587): avc: denied { read write } for pid=3322 comm="syz.2.1157" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 126.972751][ T36] audit: type=1400 audit(2000000025.764:2588): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.996864][ T36] audit: type=1400 audit(2000000025.774:2589): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 127.021148][ T36] audit: type=1400 audit(2000000025.783:2590): avc: denied { read write } for pid=3326 comm="syz.1.1159" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 127.155495][ T36] audit: type=1400 audit(2000000025.933:2591): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 127.179811][ T36] audit: type=1400 audit(2000000025.942:2592): avc: denied { read write } for pid=3328 comm="syz.2.1160" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 127.586120][ T673] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 127.586144][ T567] Bluetooth: hci1: command 0x1003 tx timeout [ 128.315052][ T3357] bridge_slave_0 (unregistering): left allmulticast mode [ 128.322167][ T3357] bridge_slave_0 (unregistering): left promiscuous mode [ 128.329347][ T3357] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.817976][ T3380] FAULT_INJECTION: forcing a failure. [ 128.817976][ T3380] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 128.831238][ T3380] CPU: 0 UID: 0 PID: 3380 Comm: syz.1.1184 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 128.831270][ T3380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 128.831279][ T3380] Call Trace: [ 128.831285][ T3380] [ 128.831291][ T3380] __dump_stack+0x21/0x30 [ 128.831313][ T3380] dump_stack_lvl+0x140/0x1c0 [ 128.831326][ T3380] ? __cfi_dump_stack_lvl+0x10/0x10 [ 128.831340][ T3380] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 128.831355][ T3380] dump_stack+0x19/0x20 [ 128.831368][ T3380] should_fail_ex+0x3d7/0x530 [ 128.831383][ T3380] should_fail_alloc_page+0xec/0x110 [ 128.831393][ T3380] __alloc_pages_noprof+0x1c0/0x7e0 [ 128.831405][ T3380] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 128.831418][ T3380] __folio_alloc_noprof+0x14/0x80 [ 128.831432][ T3380] folio_prealloc+0x46/0x220 [ 128.831450][ T3380] do_pte_missing+0x1e80/0x44f0 [ 128.831467][ T3380] ? _raw_spin_unlock+0x45/0x60 [ 128.831492][ T3380] ? pte_marker_clear+0x1b0/0x1b0 [ 128.831510][ T3380] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 128.831530][ T3380] ? walk_pgd_range+0x1b58/0x1c20 [ 128.831543][ T3380] ? __pte_offset_map+0x1b0/0x230 [ 128.831555][ T3380] ? pte_offset_map_rw_nolock+0xba/0x110 [ 128.831568][ T3380] handle_mm_fault+0x11b8/0x1bf0 [ 128.831585][ T3380] ? __kasan_check_write+0x18/0x20 [ 128.831602][ T3380] ? __cfi_handle_mm_fault+0x10/0x10 [ 128.831623][ T3380] ? follow_page_pte+0x4b9/0xbc0 [ 128.831635][ T3380] ? gup_must_unshare+0x1e0/0x1e0 [ 128.831646][ T3380] ? vma_is_secretmem+0x11/0x50 [ 128.831659][ T3380] __get_user_pages+0x1170/0x22b0 [ 128.831672][ T3380] ? populate_vma_page_range+0x220/0x220 [ 128.831682][ T3380] ? down_read+0x7f/0xe0 [ 128.831692][ T3380] ? __cfi_down_read+0x10/0x10 [ 128.831702][ T3380] __mm_populate+0x2f8/0x430 [ 128.831713][ T3380] do_mlock+0x7eb/0xa00 [ 128.831725][ T3380] ? fput+0x1a4/0x240 [ 128.831737][ T3380] ? lru_gen_add_folio+0x860/0x860 [ 128.831748][ T3380] ? ksys_write+0x1f3/0x260 [ 128.831762][ T3380] ? __cfi_ksys_write+0x10/0x10 [ 128.831775][ T3380] ? __kasan_check_read+0x15/0x20 [ 128.831788][ T3380] __x64_sys_mlock+0x64/0x80 [ 128.831799][ T3380] x64_sys_call+0x670/0x2ee0 [ 128.831812][ T3380] do_syscall_64+0x57/0xf0 [ 128.831826][ T3380] ? clear_bhb_loop+0x50/0xa0 [ 128.831842][ T3380] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 128.831854][ T3380] RIP: 0033:0x7fb58099c799 [ 128.831865][ T3380] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 128.831875][ T3380] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 128.831888][ T3380] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 128.831896][ T3380] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 128.831903][ T3380] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 128.831910][ T3380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.831917][ T3380] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 128.831926][ T3380] [ 132.010764][ T36] kauditd_printk_skb: 294 callbacks suppressed [ 132.010783][ T36] audit: type=1400 audit(2000000030.493:2887): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 132.017341][ T3522] capability: warning: `syz.2.1250' uses 32-bit capabilities (legacy support in use) [ 132.041359][ T36] audit: type=1400 audit(2000000030.493:2888): avc: denied { mounton } for pid=3521 comm="syz.2.1250" path="/337/file0" dev="tmpfs" ino=1832 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 132.073197][ T36] audit: type=1400 audit(2000000030.493:2889): avc: denied { create } for pid=3521 comm="syz.2.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 132.093144][ T36] audit: type=1400 audit(2000000030.521:2890): avc: denied { read write } for pid=3521 comm="syz.2.1250" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 132.117079][ T36] audit: type=1400 audit(2000000030.521:2891): avc: denied { mounton } for pid=3521 comm="syz.2.1250" path="/337/file0" dev="tmpfs" ino=1832 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 132.139837][ T36] audit: type=1400 audit(2000000030.521:2892): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 132.163890][ T36] audit: type=1400 audit(2000000030.521:2893): avc: denied { create } for pid=3523 comm="syz.2.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 132.184457][ T36] audit: type=1400 audit(2000000030.559:2894): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 132.208557][ T36] audit: type=1400 audit(2000000030.559:2895): avc: denied { read write } for pid=3527 comm="syz.2.1252" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 132.231992][ T36] audit: type=1400 audit(2000000030.559:2896): avc: denied { mounton } for pid=3527 comm="syz.2.1252" path="/339/file0" dev="tmpfs" ino=1844 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 132.704905][ T3552] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1264'. [ 134.396759][ T3649] netlink: 1335 bytes leftover after parsing attributes in process `syz.3.1305'. [ 134.770842][ T3654] netlink: 'syz.0.1307': attribute type 12 has an invalid length. [ 136.323385][ T3720] syzkaller1: entered promiscuous mode [ 136.329001][ T3720] syzkaller1: entered allmulticast mode [ 136.337253][ T3720] syzkaller1: left promiscuous mode [ 136.342465][ T3720] syzkaller1: left allmulticast mode [ 137.554942][ T36] kauditd_printk_skb: 287 callbacks suppressed [ 137.554963][ T36] audit: type=1400 audit(2000000035.692:3184): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.585297][ T36] audit: type=1400 audit(2000000035.692:3185): avc: denied { read write } for pid=3747 comm="syz.3.1346" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 137.618954][ T36] audit: type=1400 audit(2000000035.692:3186): avc: denied { mounton } for pid=3747 comm="syz.3.1346" path="/353/file0" dev="tmpfs" ino=1947 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 137.642732][ T36] audit: type=1400 audit(2000000035.701:3187): avc: denied { create } for pid=3747 comm="syz.3.1346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 137.663717][ T36] audit: type=1400 audit(2000000035.701:3188): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.688409][ T36] audit: type=1400 audit(2000000035.720:3189): avc: denied { read write } for pid=292 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 137.712760][ T36] audit: type=1400 audit(2000000035.729:3190): avc: denied { create } for pid=3751 comm="syz.3.1348" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 137.734401][ T36] audit: type=1400 audit(2000000035.748:3191): avc: denied { create } for pid=3751 comm="syz.3.1348" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 137.756116][ T36] audit: type=1400 audit(2000000035.748:3192): avc: denied { read write } for pid=3751 comm="syz.3.1348" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 137.779614][ T36] audit: type=1400 audit(2000000035.748:3193): avc: denied { mounton } for pid=3751 comm="syz.3.1348" path="/355/file0" dev="tmpfs" ino=1958 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 138.304837][ T3786] syzkaller0: entered promiscuous mode [ 138.310385][ T3786] syzkaller0: entered allmulticast mode [ 138.318232][ T3786] +$<¶: renamed from bridge0 (while UP) [ 138.567370][ T3793] netlink: 72 bytes leftover after parsing attributes in process `syz.2.1363'. [ 138.576787][ T3793] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1001 sclass=netlink_route_socket pid=3793 comm=syz.2.1363 [ 138.591472][ T3793] netlink: 1363 bytes leftover after parsing attributes in process `syz.2.1363'. [ 138.943077][ T3810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=3810 comm=syz.0.1370 [ 139.518897][ T3834] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=24 sclass=netlink_tcpdiag_socket pid=3834 comm=syz.0.1379 [ 140.533538][ T3866] FAULT_INJECTION: forcing a failure. [ 140.533538][ T3866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 140.546868][ T3866] CPU: 1 UID: 0 PID: 3866 Comm: syz.1.1392 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 140.546904][ T3866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 140.546913][ T3866] Call Trace: [ 140.546920][ T3866] [ 140.546925][ T3866] __dump_stack+0x21/0x30 [ 140.546947][ T3866] dump_stack_lvl+0x140/0x1c0 [ 140.546959][ T3866] ? __cfi_dump_stack_lvl+0x10/0x10 [ 140.546973][ T3866] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 140.546987][ T3866] dump_stack+0x19/0x20 [ 140.546999][ T3866] should_fail_ex+0x3d7/0x530 [ 140.547013][ T3866] should_fail_alloc_page+0xec/0x110 [ 140.547024][ T3866] __alloc_pages_noprof+0x1c0/0x7e0 [ 140.547035][ T3866] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 140.547051][ T3866] __folio_alloc_noprof+0x14/0x80 [ 140.547062][ T3866] folio_prealloc+0x46/0x220 [ 140.547073][ T3866] do_pte_missing+0x1e80/0x44f0 [ 140.547083][ T3866] ? _raw_spin_unlock+0x45/0x60 [ 140.547099][ T3866] ? pte_marker_clear+0x1b0/0x1b0 [ 140.547109][ T3866] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 140.547127][ T3866] ? walk_pgd_range+0x1b58/0x1c20 [ 140.547140][ T3866] ? __pte_offset_map+0x1b0/0x230 [ 140.547152][ T3866] ? pte_offset_map_rw_nolock+0xba/0x110 [ 140.547165][ T3866] handle_mm_fault+0x11b8/0x1bf0 [ 140.547180][ T3866] ? __kasan_check_write+0x18/0x20 [ 140.547197][ T3866] ? __cfi_handle_mm_fault+0x10/0x10 [ 140.547212][ T3866] ? follow_page_pte+0x4b9/0xbc0 [ 140.547223][ T3866] ? gup_must_unshare+0x1e0/0x1e0 [ 140.547234][ T3866] ? vma_is_secretmem+0x11/0x50 [ 140.547246][ T3866] __get_user_pages+0x1170/0x22b0 [ 140.547259][ T3866] ? populate_vma_page_range+0x220/0x220 [ 140.547269][ T3866] ? down_read+0x7f/0xe0 [ 140.547278][ T3866] ? __cfi_down_read+0x10/0x10 [ 140.547288][ T3866] __mm_populate+0x2f8/0x430 [ 140.547299][ T3866] do_mlock+0x7eb/0xa00 [ 140.547311][ T3866] ? fput+0x1a4/0x240 [ 140.547322][ T3866] ? lru_gen_add_folio+0x860/0x860 [ 140.547333][ T3866] ? ksys_write+0x1f3/0x260 [ 140.547347][ T3866] ? __cfi_ksys_write+0x10/0x10 [ 140.547359][ T3866] ? __kasan_check_read+0x15/0x20 [ 140.547372][ T3866] __x64_sys_mlock+0x64/0x80 [ 140.547382][ T3866] x64_sys_call+0x670/0x2ee0 [ 140.547396][ T3866] do_syscall_64+0x57/0xf0 [ 140.547408][ T3866] ? clear_bhb_loop+0x50/0xa0 [ 140.547423][ T3866] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 140.547436][ T3866] RIP: 0033:0x7fb58099c799 [ 140.547448][ T3866] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 140.547456][ T3866] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 140.547470][ T3866] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 140.547478][ T3866] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 140.547486][ T3866] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 140.547493][ T3866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.547500][ T3866] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 140.547509][ T3866] [ 140.654427][ T3868] netlink: 'syz.0.1393': attribute type 4 has an invalid length. [ 140.865897][ T3880] netlink: 'syz.1.1396': attribute type 27 has an invalid length. [ 140.877763][ T3880] gretap0: left allmulticast mode [ 140.887603][ T3880] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.386962][ T3898] FAULT_INJECTION: forcing a failure. [ 141.386962][ T3898] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 141.400302][ T3898] CPU: 1 UID: 0 PID: 3898 Comm: syz.2.1403 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 141.400331][ T3898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 141.400342][ T3898] Call Trace: [ 141.400349][ T3898] [ 141.400356][ T3898] __dump_stack+0x21/0x30 [ 141.400379][ T3898] dump_stack_lvl+0x140/0x1c0 [ 141.400392][ T3898] ? __cfi_dump_stack_lvl+0x10/0x10 [ 141.400405][ T3898] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 141.400423][ T3898] dump_stack+0x19/0x20 [ 141.400435][ T3898] should_fail_ex+0x3d7/0x530 [ 141.400449][ T3898] should_fail_alloc_page+0xec/0x110 [ 141.400460][ T3898] __alloc_pages_noprof+0x1c0/0x7e0 [ 141.400471][ T3898] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 141.400484][ T3898] __folio_alloc_noprof+0x14/0x80 [ 141.400495][ T3898] folio_prealloc+0x46/0x220 [ 141.400507][ T3898] do_pte_missing+0x1e80/0x44f0 [ 141.400516][ T3898] ? _raw_spin_unlock+0x45/0x60 [ 141.400532][ T3898] ? pte_marker_clear+0x1b0/0x1b0 [ 141.400542][ T3898] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 141.400561][ T3898] ? __pte_offset_map+0x1b0/0x230 [ 141.400574][ T3898] ? pte_offset_map_rw_nolock+0xba/0x110 [ 141.400589][ T3898] handle_mm_fault+0x11b8/0x1bf0 [ 141.400606][ T3898] ? __kasan_check_write+0x18/0x20 [ 141.400623][ T3898] ? __cfi_handle_mm_fault+0x10/0x10 [ 141.400638][ T3898] ? follow_page_pte+0x4b9/0xbc0 [ 141.400650][ T3898] ? gup_must_unshare+0x1e0/0x1e0 [ 141.400661][ T3898] ? vma_is_secretmem+0x11/0x50 [ 141.400674][ T3898] __get_user_pages+0x1170/0x22b0 [ 141.400686][ T3898] ? populate_vma_page_range+0x220/0x220 [ 141.400696][ T3898] ? down_read+0x7f/0xe0 [ 141.400706][ T3898] ? __cfi_down_read+0x10/0x10 [ 141.400716][ T3898] __mm_populate+0x2f8/0x430 [ 141.400726][ T3898] do_mlock+0x7eb/0xa00 [ 141.400738][ T3898] ? fput+0x1a4/0x240 [ 141.400750][ T3898] ? lru_gen_add_folio+0x860/0x860 [ 141.400761][ T3898] ? ksys_write+0x1f3/0x260 [ 141.400774][ T3898] ? __cfi_ksys_write+0x10/0x10 [ 141.400787][ T3898] ? __kasan_check_read+0x15/0x20 [ 141.400800][ T3898] __x64_sys_mlock+0x64/0x80 [ 141.400811][ T3898] x64_sys_call+0x670/0x2ee0 [ 141.400824][ T3898] do_syscall_64+0x57/0xf0 [ 141.400844][ T3898] ? clear_bhb_loop+0x50/0xa0 [ 141.400860][ T3898] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 141.400872][ T3898] RIP: 0033:0x7fed23b9c799 [ 141.400882][ T3898] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 141.400891][ T3898] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 141.400904][ T3898] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 141.400912][ T3898] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 141.400920][ T3898] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 141.400927][ T3898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 141.400934][ T3898] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 141.400943][ T3898] [ 141.740921][ T3907] syzkaller0: entered promiscuous mode [ 141.746463][ T3907] syzkaller0: entered allmulticast mode [ 142.335712][ T3927] FAULT_INJECTION: forcing a failure. [ 142.335712][ T3927] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 142.349106][ T3927] CPU: 0 UID: 0 PID: 3927 Comm: syz.2.1414 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 142.349137][ T3927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 142.349146][ T3927] Call Trace: [ 142.349150][ T3927] [ 142.349156][ T3927] __dump_stack+0x21/0x30 [ 142.349174][ T3927] dump_stack_lvl+0x140/0x1c0 [ 142.349186][ T3927] ? __cfi_dump_stack_lvl+0x10/0x10 [ 142.349200][ T3927] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 142.349213][ T3927] dump_stack+0x19/0x20 [ 142.349225][ T3927] should_fail_ex+0x3d7/0x530 [ 142.349239][ T3927] should_fail_alloc_page+0xec/0x110 [ 142.349249][ T3927] __alloc_pages_noprof+0x1c0/0x7e0 [ 142.349261][ T3927] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 142.349274][ T3927] __folio_alloc_noprof+0x14/0x80 [ 142.349286][ T3927] folio_prealloc+0x46/0x220 [ 142.349296][ T3927] do_pte_missing+0x1e80/0x44f0 [ 142.349307][ T3927] ? _raw_spin_unlock+0x45/0x60 [ 142.349321][ T3927] ? pte_marker_clear+0x1b0/0x1b0 [ 142.349332][ T3927] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 142.349348][ T3927] ? walk_pgd_range+0x1b58/0x1c20 [ 142.349362][ T3927] ? __pte_offset_map+0x1b0/0x230 [ 142.349382][ T3927] ? pte_offset_map_rw_nolock+0xba/0x110 [ 142.349402][ T3927] handle_mm_fault+0x11b8/0x1bf0 [ 142.349423][ T3927] ? __kasan_check_write+0x18/0x20 [ 142.349438][ T3927] ? __cfi_handle_mm_fault+0x10/0x10 [ 142.349459][ T3927] ? follow_page_pte+0x4b9/0xbc0 [ 142.349479][ T3927] ? gup_must_unshare+0x1e0/0x1e0 [ 142.349498][ T3927] ? vma_is_secretmem+0x11/0x50 [ 142.349512][ T3927] __get_user_pages+0x1170/0x22b0 [ 142.349579][ T3927] ? populate_vma_page_range+0x220/0x220 [ 142.349590][ T3927] ? down_read+0x7f/0xe0 [ 142.349599][ T3927] ? __cfi_down_read+0x10/0x10 [ 142.349610][ T3927] __mm_populate+0x2f8/0x430 [ 142.349620][ T3927] do_mlock+0x7eb/0xa00 [ 142.349632][ T3927] ? fput+0x1a4/0x240 [ 142.349643][ T3927] ? lru_gen_add_folio+0x860/0x860 [ 142.349654][ T3927] ? ksys_write+0x1f3/0x260 [ 142.349667][ T3927] ? __cfi_ksys_write+0x10/0x10 [ 142.349680][ T3927] ? __kasan_check_read+0x15/0x20 [ 142.349694][ T3927] __x64_sys_mlock+0x64/0x80 [ 142.349704][ T3927] x64_sys_call+0x670/0x2ee0 [ 142.349718][ T3927] do_syscall_64+0x57/0xf0 [ 142.349730][ T3927] ? clear_bhb_loop+0x50/0xa0 [ 142.349744][ T3927] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 142.349756][ T3927] RIP: 0033:0x7fed23b9c799 [ 142.349767][ T3927] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 142.349777][ T3927] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 142.349792][ T3927] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 142.349800][ T3927] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 142.349807][ T3927] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 142.349815][ T3927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.349822][ T3927] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 142.349831][ T3927] [ 142.743310][ T3933] can0: slcan on ptm1. [ 142.890075][ T36] kauditd_printk_skb: 2122 callbacks suppressed [ 142.890092][ T36] audit: type=1400 audit(2000000040.693:4878): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.905371][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.918289][ T36] audit: type=1400 audit(2000000040.702:4879): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.924066][ T149] audit: audit_lost=150 audit_rate_limit=0 audit_backlog_limit=64 [ 142.924083][ T149] audit: backlog limit exceeded [ 142.947703][ T36] audit: type=1400 audit(2000000040.702:4880): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.953055][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.958016][ T36] audit: type=1400 audit(2000000040.702:4881): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.978976][ T149] audit: audit_lost=151 audit_rate_limit=0 audit_backlog_limit=64 [ 142.987573][ T36] audit: type=1400 audit(2000000040.702:4882): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.287053][ T3931] can0 (unregistered): slcan off ptm1. [ 143.332038][ T3954] FAULT_INJECTION: forcing a failure. [ 143.332038][ T3954] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 143.345384][ T3954] CPU: 1 UID: 0 PID: 3954 Comm: syz.2.1423 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 143.345412][ T3954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 143.345423][ T3954] Call Trace: [ 143.345429][ T3954] [ 143.345437][ T3954] __dump_stack+0x21/0x30 [ 143.345464][ T3954] dump_stack_lvl+0x140/0x1c0 [ 143.345486][ T3954] ? __cfi_dump_stack_lvl+0x10/0x10 [ 143.345509][ T3954] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 143.345538][ T3954] dump_stack+0x19/0x20 [ 143.345558][ T3954] should_fail_ex+0x3d7/0x530 [ 143.345580][ T3954] should_fail_alloc_page+0xec/0x110 [ 143.345598][ T3954] __alloc_pages_noprof+0x1c0/0x7e0 [ 143.345616][ T3954] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 143.345635][ T3954] __folio_alloc_noprof+0x14/0x80 [ 143.345654][ T3954] folio_prealloc+0x46/0x220 [ 143.345672][ T3954] do_pte_missing+0x1e80/0x44f0 [ 143.345688][ T3954] ? _raw_spin_unlock+0x45/0x60 [ 143.345712][ T3954] ? pte_marker_clear+0x1b0/0x1b0 [ 143.345731][ T3954] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 143.345759][ T3954] ? __pte_offset_map+0x1b0/0x230 [ 143.345781][ T3954] ? pte_offset_map_rw_nolock+0xba/0x110 [ 143.345803][ T3954] handle_mm_fault+0x11b8/0x1bf0 [ 143.345827][ T3954] ? __kasan_check_write+0x18/0x20 [ 143.345853][ T3954] ? __cfi_handle_mm_fault+0x10/0x10 [ 143.345879][ T3954] ? follow_page_pte+0x4b9/0xbc0 [ 143.345899][ T3954] ? gup_must_unshare+0x1e0/0x1e0 [ 143.345918][ T3954] ? vma_is_secretmem+0x11/0x50 [ 143.345936][ T3954] __get_user_pages+0x1170/0x22b0 [ 143.345958][ T3954] ? populate_vma_page_range+0x220/0x220 [ 143.345976][ T3954] ? down_read+0x7f/0xe0 [ 143.345993][ T3954] ? __cfi_down_read+0x10/0x10 [ 143.346012][ T3954] __mm_populate+0x2f8/0x430 [ 143.346030][ T3954] do_mlock+0x7eb/0xa00 [ 143.346051][ T3954] ? fput+0x1a4/0x240 [ 143.346069][ T3954] ? lru_gen_add_folio+0x860/0x860 [ 143.346088][ T3954] ? ksys_write+0x1f3/0x260 [ 143.346111][ T3954] ? __cfi_ksys_write+0x10/0x10 [ 143.346133][ T3954] ? __kasan_check_read+0x15/0x20 [ 143.346156][ T3954] __x64_sys_mlock+0x64/0x80 [ 143.346175][ T3954] x64_sys_call+0x670/0x2ee0 [ 143.346200][ T3954] do_syscall_64+0x57/0xf0 [ 143.346221][ T3954] ? clear_bhb_loop+0x50/0xa0 [ 143.346244][ T3954] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 143.346265][ T3954] RIP: 0033:0x7fed23b9c799 [ 143.346282][ T3954] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 143.346298][ T3954] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 143.346321][ T3954] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 143.346336][ T3954] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 143.346350][ T3954] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 143.346363][ T3954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.346375][ T3954] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 143.346392][ T3954] [ 144.639960][ T3973] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1431'. [ 145.125746][ T3982] FAULT_INJECTION: forcing a failure. [ 145.125746][ T3982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 145.140504][ T3982] CPU: 1 UID: 0 PID: 3982 Comm: syz.1.1435 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 145.140533][ T3982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 145.140545][ T3982] Call Trace: [ 145.140553][ T3982] [ 145.140560][ T3982] __dump_stack+0x21/0x30 [ 145.140587][ T3982] dump_stack_lvl+0x140/0x1c0 [ 145.140608][ T3982] ? __cfi_dump_stack_lvl+0x10/0x10 [ 145.140630][ T3982] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 145.140651][ T3982] dump_stack+0x19/0x20 [ 145.140672][ T3982] should_fail_ex+0x3d7/0x530 [ 145.140694][ T3982] should_fail_alloc_page+0xec/0x110 [ 145.140712][ T3982] __alloc_pages_noprof+0x1c0/0x7e0 [ 145.140732][ T3982] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 145.140756][ T3982] __folio_alloc_noprof+0x14/0x80 [ 145.140775][ T3982] folio_prealloc+0x46/0x220 [ 145.140792][ T3982] do_pte_missing+0x1e80/0x44f0 [ 145.140810][ T3982] ? _raw_spin_unlock+0x45/0x60 [ 145.140835][ T3982] ? pte_marker_clear+0x1b0/0x1b0 [ 145.140853][ T3982] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 145.140880][ T3982] ? __pte_offset_map+0x1b0/0x230 [ 145.140902][ T3982] ? pte_offset_map_rw_nolock+0xba/0x110 [ 145.140924][ T3982] handle_mm_fault+0x11b8/0x1bf0 [ 145.140949][ T3982] ? __kasan_check_write+0x18/0x20 [ 145.140974][ T3982] ? __cfi_handle_mm_fault+0x10/0x10 [ 145.140999][ T3982] ? follow_page_pte+0x4b9/0xbc0 [ 145.141019][ T3982] ? gup_must_unshare+0x1e0/0x1e0 [ 145.141038][ T3982] ? vma_is_secretmem+0x11/0x50 [ 145.141060][ T3982] __get_user_pages+0x1170/0x22b0 [ 145.141083][ T3982] ? populate_vma_page_range+0x220/0x220 [ 145.141101][ T3982] ? down_read+0x7f/0xe0 [ 145.141117][ T3982] ? __cfi_down_read+0x10/0x10 [ 145.141135][ T3982] __mm_populate+0x2f8/0x430 [ 145.141155][ T3982] do_mlock+0x7eb/0xa00 [ 145.141175][ T3982] ? fput+0x1a4/0x240 [ 145.141193][ T3982] ? lru_gen_add_folio+0x860/0x860 [ 145.141212][ T3982] ? ksys_write+0x1f3/0x260 [ 145.141235][ T3982] ? __cfi_ksys_write+0x10/0x10 [ 145.141257][ T3982] ? __kasan_check_read+0x15/0x20 [ 145.141280][ T3982] __x64_sys_mlock+0x64/0x80 [ 145.141299][ T3982] x64_sys_call+0x670/0x2ee0 [ 145.141322][ T3982] do_syscall_64+0x57/0xf0 [ 145.141343][ T3982] ? clear_bhb_loop+0x50/0xa0 [ 145.141365][ T3982] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 145.141387][ T3982] RIP: 0033:0x7fb58099c799 [ 145.141404][ T3982] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 145.141420][ T3982] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 145.141450][ T3982] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 145.141465][ T3982] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 145.141479][ T3982] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 145.141492][ T3982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.141505][ T3982] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 145.141527][ T3982] [ 146.487187][ T4018] FAULT_INJECTION: forcing a failure. [ 146.487187][ T4018] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 146.500940][ T4018] CPU: 0 UID: 0 PID: 4018 Comm: syz.1.1450 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 146.500966][ T4018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 146.500977][ T4018] Call Trace: [ 146.500983][ T4018] [ 146.500991][ T4018] __dump_stack+0x21/0x30 [ 146.501019][ T4018] dump_stack_lvl+0x140/0x1c0 [ 146.501039][ T4018] ? __cfi_dump_stack_lvl+0x10/0x10 [ 146.501059][ T4018] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 146.501079][ T4018] dump_stack+0x19/0x20 [ 146.501099][ T4018] should_fail_ex+0x3d7/0x530 [ 146.501121][ T4018] should_fail_alloc_page+0xec/0x110 [ 146.501139][ T4018] __alloc_pages_noprof+0x1c0/0x7e0 [ 146.501160][ T4018] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 146.501182][ T4018] __folio_alloc_noprof+0x14/0x80 [ 146.501202][ T4018] folio_prealloc+0x46/0x220 [ 146.501220][ T4018] do_pte_missing+0x1e80/0x44f0 [ 146.501240][ T4018] ? pte_marker_clear+0x1b0/0x1b0 [ 146.501259][ T4018] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 146.501285][ T4018] ? __schedule+0x1357/0x1ea0 [ 146.501309][ T4018] ? __pte_offset_map+0x1b0/0x230 [ 146.501330][ T4018] ? pte_offset_map_rw_nolock+0xba/0x110 [ 146.501351][ T4018] handle_mm_fault+0x11b8/0x1bf0 [ 146.501374][ T4018] ? __kasan_check_write+0x18/0x20 [ 146.501399][ T4018] ? __cfi_handle_mm_fault+0x10/0x10 [ 146.501424][ T4018] ? follow_page_pte+0x4b9/0xbc0 [ 146.501444][ T4018] ? gup_must_unshare+0x1e0/0x1e0 [ 146.501464][ T4018] ? __get_user_pages+0x582/0x22b0 [ 146.501483][ T4018] __get_user_pages+0x1170/0x22b0 [ 146.501505][ T4018] ? populate_vma_page_range+0x220/0x220 [ 146.501523][ T4018] ? down_read+0x7f/0xe0 [ 146.501540][ T4018] ? __cfi_down_read+0x10/0x10 [ 146.501558][ T4018] __mm_populate+0x2f8/0x430 [ 146.501578][ T4018] do_mlock+0x7eb/0xa00 [ 146.501607][ T4018] ? fput+0x1a4/0x240 [ 146.501625][ T4018] ? lru_gen_add_folio+0x860/0x860 [ 146.501644][ T4018] ? ksys_write+0x1f3/0x260 [ 146.501667][ T4018] ? __cfi_ksys_write+0x10/0x10 [ 146.501690][ T4018] ? __kasan_check_read+0x15/0x20 [ 146.501711][ T4018] __x64_sys_mlock+0x64/0x80 [ 146.501730][ T4018] x64_sys_call+0x670/0x2ee0 [ 146.501753][ T4018] do_syscall_64+0x57/0xf0 [ 146.501774][ T4018] ? clear_bhb_loop+0x50/0xa0 [ 146.501797][ T4018] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 146.501817][ T4018] RIP: 0033:0x7fb58099c799 [ 146.501833][ T4018] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 146.501848][ T4018] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 146.501871][ T4018] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 146.501885][ T4018] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 146.501898][ T4018] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 146.501911][ T4018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.501922][ T4018] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 146.501938][ T4018] [ 147.353005][ T4047] FAULT_INJECTION: forcing a failure. [ 147.353005][ T4047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 147.366773][ T4047] CPU: 0 UID: 0 PID: 4047 Comm: syz.2.1460 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 147.366802][ T4047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 147.366814][ T4047] Call Trace: [ 147.366820][ T4047] [ 147.366829][ T4047] __dump_stack+0x21/0x30 [ 147.366856][ T4047] dump_stack_lvl+0x140/0x1c0 [ 147.366878][ T4047] ? __cfi_dump_stack_lvl+0x10/0x10 [ 147.366900][ T4047] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 147.366922][ T4047] dump_stack+0x19/0x20 [ 147.366943][ T4047] should_fail_ex+0x3d7/0x530 [ 147.366964][ T4047] should_fail_alloc_page+0xec/0x110 [ 147.366982][ T4047] __alloc_pages_noprof+0x1c0/0x7e0 [ 147.367002][ T4047] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 147.367026][ T4047] __folio_alloc_noprof+0x14/0x80 [ 147.367047][ T4047] folio_prealloc+0x46/0x220 [ 147.367064][ T4047] do_pte_missing+0x1e80/0x44f0 [ 147.367084][ T4047] ? pte_marker_clear+0x1b0/0x1b0 [ 147.367102][ T4047] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 147.367130][ T4047] ? __pte_offset_map+0x1b0/0x230 [ 147.367151][ T4047] ? pte_offset_map_rw_nolock+0xba/0x110 [ 147.367173][ T4047] handle_mm_fault+0x11b8/0x1bf0 [ 147.367197][ T4047] ? __kasan_check_write+0x18/0x20 [ 147.367223][ T4047] ? __cfi_handle_mm_fault+0x10/0x10 [ 147.367248][ T4047] ? follow_page_pte+0x4b9/0xbc0 [ 147.367268][ T4047] ? gup_must_unshare+0x1e0/0x1e0 [ 147.367289][ T4047] __get_user_pages+0x1170/0x22b0 [ 147.367309][ T4047] ? populate_vma_page_range+0x220/0x220 [ 147.367329][ T4047] ? down_read+0x7f/0xe0 [ 147.367348][ T4047] ? __cfi_down_read+0x10/0x10 [ 147.367370][ T4047] __mm_populate+0x2f8/0x430 [ 147.367389][ T4047] do_mlock+0x7eb/0xa00 [ 147.367408][ T4047] ? fput+0x1a4/0x240 [ 147.367426][ T4047] ? lru_gen_add_folio+0x860/0x860 [ 147.367447][ T4047] ? ksys_write+0x1f3/0x260 [ 147.367470][ T4047] ? __cfi_ksys_write+0x10/0x10 [ 147.367493][ T4047] ? __kasan_check_read+0x15/0x20 [ 147.367515][ T4047] __x64_sys_mlock+0x64/0x80 [ 147.367534][ T4047] x64_sys_call+0x670/0x2ee0 [ 147.367564][ T4047] do_syscall_64+0x57/0xf0 [ 147.367585][ T4047] ? clear_bhb_loop+0x50/0xa0 [ 147.367608][ T4047] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 147.367630][ T4047] RIP: 0033:0x7fed23b9c799 [ 147.367646][ T4047] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 147.367663][ T4047] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 147.367685][ T4047] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 147.367699][ T4047] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 147.367713][ T4047] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 147.367726][ T4047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 147.367739][ T4047] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 147.367757][ T4047] [ 148.153735][ T4080] FAULT_INJECTION: forcing a failure. [ 148.153735][ T4080] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 148.191459][ T4080] CPU: 0 UID: 0 PID: 4080 Comm: syz.3.1472 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 148.191494][ T4080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 148.191507][ T4080] Call Trace: [ 148.191517][ T4080] [ 148.191532][ T4080] __dump_stack+0x21/0x30 [ 148.191561][ T4080] dump_stack_lvl+0x140/0x1c0 [ 148.191583][ T4080] ? __cfi_dump_stack_lvl+0x10/0x10 [ 148.191606][ T4080] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 148.191628][ T4080] dump_stack+0x19/0x20 [ 148.191649][ T4080] should_fail_ex+0x3d7/0x530 [ 148.191672][ T4080] should_fail_alloc_page+0xec/0x110 [ 148.191691][ T4080] __alloc_pages_noprof+0x1c0/0x7e0 [ 148.191711][ T4080] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 148.191736][ T4080] __folio_alloc_noprof+0x14/0x80 [ 148.191756][ T4080] folio_prealloc+0x46/0x220 [ 148.191773][ T4080] do_pte_missing+0x1e80/0x44f0 [ 148.191790][ T4080] ? _raw_spin_unlock+0x45/0x60 [ 148.191815][ T4080] ? pte_marker_clear+0x1b0/0x1b0 [ 148.191833][ T4080] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 148.191870][ T4080] ? __pte_offset_map+0x1b0/0x230 [ 148.191892][ T4080] ? pte_offset_map_rw_nolock+0xba/0x110 [ 148.191915][ T4080] handle_mm_fault+0x11b8/0x1bf0 [ 148.191946][ T4080] ? __kasan_check_write+0x18/0x20 [ 148.191975][ T4080] ? __cfi_handle_mm_fault+0x10/0x10 [ 148.192000][ T4080] ? follow_page_pte+0x4b9/0xbc0 [ 148.192021][ T4080] ? gup_must_unshare+0x1e0/0x1e0 [ 148.192039][ T4080] ? vma_is_secretmem+0x11/0x50 [ 148.192059][ T4080] __get_user_pages+0x1170/0x22b0 [ 148.192080][ T4080] ? populate_vma_page_range+0x220/0x220 [ 148.192099][ T4080] ? down_read+0x7f/0xe0 [ 148.192116][ T4080] ? __cfi_down_read+0x10/0x10 [ 148.192134][ T4080] __mm_populate+0x2f8/0x430 [ 148.192153][ T4080] do_mlock+0x7eb/0xa00 [ 148.192174][ T4080] ? fput+0x1a4/0x240 [ 148.192191][ T4080] ? lru_gen_add_folio+0x860/0x860 [ 148.192218][ T4080] ? ksys_write+0x1f3/0x260 [ 148.192293][ T4080] ? __cfi_ksys_write+0x10/0x10 [ 148.192316][ T4080] ? __kasan_check_read+0x15/0x20 [ 148.192338][ T4080] __x64_sys_mlock+0x64/0x80 [ 148.192357][ T4080] x64_sys_call+0x670/0x2ee0 [ 148.192380][ T4080] do_syscall_64+0x57/0xf0 [ 148.192401][ T4080] ? clear_bhb_loop+0x50/0xa0 [ 148.192424][ T4080] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 148.192446][ T4080] RIP: 0033:0x7f44ae99c799 [ 148.192464][ T4080] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 148.192480][ T4080] RSP: 002b:00007f44af8d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 148.192501][ T4080] RAX: ffffffffffffffda RBX: 00007f44aec15fa0 RCX: 00007f44ae99c799 [ 148.192516][ T4080] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 148.192530][ T4080] RBP: 00007f44af8d6090 R08: 0000000000000000 R09: 0000000000000000 [ 148.192542][ T4080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.192555][ T4080] R13: 00007f44aec16038 R14: 00007f44aec15fa0 R15: 00007ffd9b52ca48 [ 148.192571][ T4080] [ 148.549667][ T36] kauditd_printk_skb: 78399 callbacks suppressed [ 148.549685][ T36] audit: type=1400 audit(2000000046.013:46912): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.565323][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 148.577489][ T36] audit: type=1400 audit(2000000046.013:46913): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.605143][ T36] audit: type=1400 audit(2000000046.013:46914): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.626225][ T36] audit: type=1400 audit(2000000046.013:46915): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.645264][ T4082] audit: audit_backlog=65 > audit_backlog_limit=64 [ 148.647337][ T36] audit: type=1400 audit(2000000046.013:46916): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.666396][ T4082] audit: audit_lost=12275 audit_rate_limit=0 audit_backlog_limit=64 [ 148.674986][ T36] audit: type=1400 audit(2000000046.013:46917): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 148.683400][ T149] audit: audit_lost=12276 audit_rate_limit=0 audit_backlog_limit=64 [ 148.844121][ T4088] syzkaller1: entered promiscuous mode [ 148.874043][ T4088] syzkaller1: entered allmulticast mode [ 149.018685][ T4103] netlink: 72 bytes leftover after parsing attributes in process `syz.3.1483'. [ 150.125079][ T4165] netlink: 'syz.1.1506': attribute type 4 has an invalid length. [ 150.133317][ T4165] netlink: 17 bytes leftover after parsing attributes in process `syz.1.1506'. [ 151.660256][ T4222] netlink: 'syz.0.1532': attribute type 32 has an invalid length. [ 151.668130][ T4222] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1532'. [ 152.339026][ T4249] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1544'. [ 153.243132][ T4298] FAULT_INJECTION: forcing a failure. [ 153.243132][ T4298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.256543][ T4298] CPU: 1 UID: 0 PID: 4298 Comm: syz.3.1560 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 153.256577][ T4298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 153.256591][ T4298] Call Trace: [ 153.256597][ T4298] [ 153.256605][ T4298] __dump_stack+0x21/0x30 [ 153.256634][ T4298] dump_stack_lvl+0x140/0x1c0 [ 153.256656][ T4298] ? __cfi_dump_stack_lvl+0x10/0x10 [ 153.256678][ T4298] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 153.256700][ T4298] dump_stack+0x19/0x20 [ 153.256721][ T4298] should_fail_ex+0x3d7/0x530 [ 153.256743][ T4298] should_fail_alloc_page+0xec/0x110 [ 153.256762][ T4298] __alloc_pages_noprof+0x1c0/0x7e0 [ 153.256783][ T4298] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 153.256807][ T4298] __folio_alloc_noprof+0x14/0x80 [ 153.256827][ T4298] folio_prealloc+0x46/0x220 [ 153.256845][ T4298] do_pte_missing+0x1e80/0x44f0 [ 153.256864][ T4298] ? _raw_spin_unlock+0x45/0x60 [ 153.256890][ T4298] ? pte_marker_clear+0x1b0/0x1b0 [ 153.256908][ T4298] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 153.256935][ T4298] ? __pte_offset_map+0x1b0/0x230 [ 153.256957][ T4298] ? pte_offset_map_rw_nolock+0xba/0x110 [ 153.256980][ T4298] handle_mm_fault+0x11b8/0x1bf0 [ 153.257005][ T4298] ? __kasan_check_write+0x18/0x20 [ 153.257030][ T4298] ? __cfi_handle_mm_fault+0x10/0x10 [ 153.257055][ T4298] ? follow_page_pte+0x4b9/0xbc0 [ 153.257075][ T4298] ? gup_must_unshare+0x1e0/0x1e0 [ 153.257094][ T4298] ? vma_is_secretmem+0x11/0x50 [ 153.257115][ T4298] __get_user_pages+0x1170/0x22b0 [ 153.257137][ T4298] ? populate_vma_page_range+0x220/0x220 [ 153.257155][ T4298] ? down_read+0x7f/0xe0 [ 153.257172][ T4298] ? __cfi_down_read+0x10/0x10 [ 153.257191][ T4298] __mm_populate+0x2f8/0x430 [ 153.257210][ T4298] do_mlock+0x7eb/0xa00 [ 153.257231][ T4298] ? fput+0x1a4/0x240 [ 153.257249][ T4298] ? lru_gen_add_folio+0x860/0x860 [ 153.257278][ T4298] ? ksys_write+0x1f3/0x260 [ 153.257301][ T4298] ? __cfi_ksys_write+0x10/0x10 [ 153.257324][ T4298] ? __kasan_check_read+0x15/0x20 [ 153.257346][ T4298] __x64_sys_mlock+0x64/0x80 [ 153.257365][ T4298] x64_sys_call+0x670/0x2ee0 [ 153.257388][ T4298] do_syscall_64+0x57/0xf0 [ 153.257410][ T4298] ? clear_bhb_loop+0x50/0xa0 [ 153.257431][ T4298] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 153.257453][ T4298] RIP: 0033:0x7f44ae99c799 [ 153.257470][ T4298] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 153.257486][ T4298] RSP: 002b:00007f44af8d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 153.257508][ T4298] RAX: ffffffffffffffda RBX: 00007f44aec15fa0 RCX: 00007f44ae99c799 [ 153.257523][ T4298] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 153.257536][ T4298] RBP: 00007f44af8d6090 R08: 0000000000000000 R09: 0000000000000000 [ 153.257549][ T4298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 153.257562][ T4298] R13: 00007f44aec16038 R14: 00007f44aec15fa0 R15: 00007ffd9b52ca48 [ 153.257579][ T4298] [ 153.792759][ T4315] netlink: 'syz.3.1566': attribute type 9 has an invalid length. [ 153.888829][ T36] kauditd_printk_skb: 48783 callbacks suppressed [ 153.888846][ T36] audit: type=1400 audit(2000000051.024:93809): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 153.917751][ T36] audit: type=1400 audit(2000000051.024:93810): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 153.939380][ T36] audit: type=1400 audit(2000000051.024:93811): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 153.961019][ T36] audit: type=1400 audit(2000000051.024:93812): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 153.982399][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 153.982460][ T36] audit: type=1400 audit(2000000051.024:93813): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 153.989094][ T149] audit: audit_lost=12907 audit_rate_limit=0 audit_backlog_limit=64 [ 154.010065][ T36] audit: type=1400 audit(2000000051.024:93814): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 154.039512][ T36] audit: type=1400 audit(2000000051.024:93815): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 154.060635][ T36] audit: type=1400 audit(2000000051.024:93816): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 154.423240][ T4335] FAULT_INJECTION: forcing a failure. [ 154.423240][ T4335] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 154.437252][ T4335] CPU: 0 UID: 0 PID: 4335 Comm: syz.2.1574 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 154.437285][ T4335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 154.437297][ T4335] Call Trace: [ 154.437304][ T4335] [ 154.437312][ T4335] __dump_stack+0x21/0x30 [ 154.437337][ T4335] dump_stack_lvl+0x140/0x1c0 [ 154.437356][ T4335] ? __cfi_dump_stack_lvl+0x10/0x10 [ 154.437376][ T4335] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 154.437397][ T4335] dump_stack+0x19/0x20 [ 154.437416][ T4335] should_fail_ex+0x3d7/0x530 [ 154.437436][ T4335] should_fail_alloc_page+0xec/0x110 [ 154.437454][ T4335] __alloc_pages_noprof+0x1c0/0x7e0 [ 154.437474][ T4335] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 154.437497][ T4335] __folio_alloc_noprof+0x14/0x80 [ 154.437517][ T4335] folio_prealloc+0x46/0x220 [ 154.437535][ T4335] do_pte_missing+0x1e80/0x44f0 [ 154.437552][ T4335] ? finish_task_switch+0x139/0x760 [ 154.437575][ T4335] ? pte_marker_clear+0x1b0/0x1b0 [ 154.437594][ T4335] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 154.437621][ T4335] ? __pte_offset_map+0x1b0/0x230 [ 154.437643][ T4335] ? pte_offset_map_rw_nolock+0xba/0x110 [ 154.437665][ T4335] handle_mm_fault+0x11b8/0x1bf0 [ 154.437689][ T4335] ? __kasan_check_write+0x18/0x20 [ 154.437715][ T4335] ? __cfi_handle_mm_fault+0x10/0x10 [ 154.437740][ T4335] ? follow_page_pte+0x4b9/0xbc0 [ 154.437760][ T4335] ? gup_must_unshare+0x1e0/0x1e0 [ 154.437779][ T4335] ? vma_is_secretmem+0x11/0x50 [ 154.437800][ T4335] __get_user_pages+0x1170/0x22b0 [ 154.437821][ T4335] ? populate_vma_page_range+0x220/0x220 [ 154.437840][ T4335] ? down_read+0x7f/0xe0 [ 154.437857][ T4335] ? __cfi_down_read+0x10/0x10 [ 154.437876][ T4335] __mm_populate+0x2f8/0x430 [ 154.437894][ T4335] do_mlock+0x7eb/0xa00 [ 154.437914][ T4335] ? fput+0x1a4/0x240 [ 154.437931][ T4335] ? lru_gen_add_folio+0x860/0x860 [ 154.437950][ T4335] ? ksys_write+0x1f3/0x260 [ 154.437972][ T4335] ? __cfi_ksys_write+0x10/0x10 [ 154.437995][ T4335] ? __kasan_check_read+0x15/0x20 [ 154.438017][ T4335] __x64_sys_mlock+0x64/0x80 [ 154.438035][ T4335] x64_sys_call+0x670/0x2ee0 [ 154.438058][ T4335] do_syscall_64+0x57/0xf0 [ 154.438078][ T4335] ? clear_bhb_loop+0x50/0xa0 [ 154.438101][ T4335] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 154.438120][ T4335] RIP: 0033:0x7fed23b9c799 [ 154.438135][ T4335] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 154.438148][ T4335] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 154.438179][ T4335] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 154.438192][ T4335] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 154.438204][ T4335] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 154.438218][ T4335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.438228][ T4335] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 154.438244][ T4335] [ 154.827488][ T4349] x_tables: unsorted underflow at hook 4 [ 155.333595][ T4375] FAULT_INJECTION: forcing a failure. [ 155.333595][ T4375] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 155.347136][ T4375] CPU: 0 UID: 0 PID: 4375 Comm: syz.3.1587 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 155.347165][ T4375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 155.347177][ T4375] Call Trace: [ 155.347184][ T4375] [ 155.347192][ T4375] __dump_stack+0x21/0x30 [ 155.347220][ T4375] dump_stack_lvl+0x140/0x1c0 [ 155.347242][ T4375] ? __cfi_dump_stack_lvl+0x10/0x10 [ 155.347264][ T4375] ? __kasan_check_read+0x15/0x20 [ 155.347287][ T4375] ? try_charge_memcg+0xa45/0xe10 [ 155.347308][ T4375] dump_stack+0x19/0x20 [ 155.347329][ T4375] should_fail_ex+0x3d7/0x530 [ 155.347352][ T4375] should_fail_alloc_page+0xec/0x110 [ 155.347369][ T4375] __alloc_pages_noprof+0x1c0/0x7e0 [ 155.347390][ T4375] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 155.347412][ T4375] ? __kasan_check_write+0x18/0x20 [ 155.347435][ T4375] __folio_alloc_noprof+0x14/0x80 [ 155.347456][ T4375] folio_prealloc+0x46/0x220 [ 155.347474][ T4375] do_pte_missing+0x1e80/0x44f0 [ 155.347491][ T4375] ? _raw_spin_unlock+0x45/0x60 [ 155.347516][ T4375] ? pte_marker_clear+0x1b0/0x1b0 [ 155.347534][ T4375] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 155.347563][ T4375] ? __pte_offset_map+0x1b0/0x230 [ 155.347586][ T4375] ? pte_offset_map_rw_nolock+0xba/0x110 [ 155.347608][ T4375] handle_mm_fault+0x11b8/0x1bf0 [ 155.347633][ T4375] ? __kasan_check_write+0x18/0x20 [ 155.347657][ T4375] ? __cfi_handle_mm_fault+0x10/0x10 [ 155.347683][ T4375] ? follow_page_pte+0x4b9/0xbc0 [ 155.347704][ T4375] ? gup_must_unshare+0x1e0/0x1e0 [ 155.347723][ T4375] ? vma_is_secretmem+0x11/0x50 [ 155.347744][ T4375] __get_user_pages+0x1170/0x22b0 [ 155.347764][ T4375] ? populate_vma_page_range+0x220/0x220 [ 155.347783][ T4375] ? down_read+0x7f/0xe0 [ 155.347800][ T4375] ? __cfi_down_read+0x10/0x10 [ 155.347818][ T4375] __mm_populate+0x2f8/0x430 [ 155.347836][ T4375] do_mlock+0x7eb/0xa00 [ 155.347855][ T4375] ? fput+0x1a4/0x240 [ 155.347873][ T4375] ? lru_gen_add_folio+0x860/0x860 [ 155.347893][ T4375] ? ksys_write+0x1f3/0x260 [ 155.347915][ T4375] ? xfd_validate_state+0x68/0x140 [ 155.347937][ T4375] ? __cfi_ksys_write+0x10/0x10 [ 155.347960][ T4375] ? __kasan_check_read+0x15/0x20 [ 155.347982][ T4375] __x64_sys_mlock+0x64/0x80 [ 155.348001][ T4375] x64_sys_call+0x670/0x2ee0 [ 155.348022][ T4375] do_syscall_64+0x57/0xf0 [ 155.348044][ T4375] ? clear_bhb_loop+0x50/0xa0 [ 155.348079][ T4375] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 155.348100][ T4375] RIP: 0033:0x7f44ae99c799 [ 155.348116][ T4375] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 155.348132][ T4375] RSP: 002b:00007f44af8d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 155.348153][ T4375] RAX: ffffffffffffffda RBX: 00007f44aec15fa0 RCX: 00007f44ae99c799 [ 155.348169][ T4375] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 155.348183][ T4375] RBP: 00007f44af8d6090 R08: 0000000000000000 R09: 0000000000000000 [ 155.348196][ T4375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 155.348210][ T4375] R13: 00007f44aec16038 R14: 00007f44aec15fa0 R15: 00007ffd9b52ca48 [ 155.348226][ T4375] [ 156.678514][ T4397] FAULT_INJECTION: forcing a failure. [ 156.678514][ T4397] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 156.692276][ T4397] CPU: 1 UID: 0 PID: 4397 Comm: syz.2.1597 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 156.692306][ T4397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 156.692317][ T4397] Call Trace: [ 156.692324][ T4397] [ 156.692332][ T4397] __dump_stack+0x21/0x30 [ 156.692360][ T4397] dump_stack_lvl+0x140/0x1c0 [ 156.692382][ T4397] ? __cfi_dump_stack_lvl+0x10/0x10 [ 156.692405][ T4397] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 156.692427][ T4397] dump_stack+0x19/0x20 [ 156.692447][ T4397] should_fail_ex+0x3d7/0x530 [ 156.692470][ T4397] should_fail_alloc_page+0xec/0x110 [ 156.692489][ T4397] __alloc_pages_noprof+0x1c0/0x7e0 [ 156.692509][ T4397] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 156.692533][ T4397] __folio_alloc_noprof+0x14/0x80 [ 156.692553][ T4397] folio_prealloc+0x46/0x220 [ 156.692572][ T4397] do_pte_missing+0x1e80/0x44f0 [ 156.692590][ T4397] ? _raw_spin_unlock+0x45/0x60 [ 156.692614][ T4397] ? pte_marker_clear+0x1b0/0x1b0 [ 156.692632][ T4397] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 156.692659][ T4397] ? __pte_offset_map+0x1b0/0x230 [ 156.692681][ T4397] ? pte_offset_map_rw_nolock+0xba/0x110 [ 156.692703][ T4397] handle_mm_fault+0x11b8/0x1bf0 [ 156.692728][ T4397] ? __kasan_check_write+0x18/0x20 [ 156.692752][ T4397] ? __cfi_handle_mm_fault+0x10/0x10 [ 156.692777][ T4397] ? follow_page_pte+0x4b9/0xbc0 [ 156.692798][ T4397] ? gup_must_unshare+0x1e0/0x1e0 [ 156.692817][ T4397] ? vma_is_secretmem+0x11/0x50 [ 156.692837][ T4397] __get_user_pages+0x1170/0x22b0 [ 156.692858][ T4397] ? populate_vma_page_range+0x220/0x220 [ 156.692877][ T4397] ? down_read+0x7f/0xe0 [ 156.692895][ T4397] ? __cfi_down_read+0x10/0x10 [ 156.692912][ T4397] __mm_populate+0x2f8/0x430 [ 156.692926][ T4397] do_mlock+0x7eb/0xa00 [ 156.692941][ T4397] ? fput+0x1a4/0x240 [ 156.692959][ T4397] ? lru_gen_add_folio+0x860/0x860 [ 156.692979][ T4397] ? ksys_write+0x1f3/0x260 [ 156.693009][ T4397] ? __cfi_ksys_write+0x10/0x10 [ 156.693033][ T4397] ? __kasan_check_read+0x15/0x20 [ 156.693055][ T4397] __x64_sys_mlock+0x64/0x80 [ 156.693073][ T4397] x64_sys_call+0x670/0x2ee0 [ 156.693096][ T4397] do_syscall_64+0x57/0xf0 [ 156.693116][ T4397] ? clear_bhb_loop+0x50/0xa0 [ 156.693138][ T4397] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 156.693161][ T4397] RIP: 0033:0x7fed23b9c799 [ 156.693177][ T4397] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 156.693193][ T4397] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 156.693215][ T4397] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 156.693230][ T4397] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 156.693244][ T4397] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 156.693258][ T4397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 156.693271][ T4397] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 156.693285][ T4397] [ 158.168973][ T4441] FAULT_INJECTION: forcing a failure. [ 158.168973][ T4441] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 158.188124][ T4441] CPU: 0 UID: 0 PID: 4441 Comm: syz.1.1614 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 158.188157][ T4441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 158.188170][ T4441] Call Trace: [ 158.188177][ T4441] [ 158.188185][ T4441] __dump_stack+0x21/0x30 [ 158.188213][ T4441] dump_stack_lvl+0x140/0x1c0 [ 158.188234][ T4441] ? __cfi_dump_stack_lvl+0x10/0x10 [ 158.188254][ T4441] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 158.188275][ T4441] dump_stack+0x19/0x20 [ 158.188295][ T4441] should_fail_ex+0x3d7/0x530 [ 158.188315][ T4441] should_fail_alloc_page+0xec/0x110 [ 158.188333][ T4441] __alloc_pages_noprof+0x1c0/0x7e0 [ 158.188354][ T4441] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 158.188378][ T4441] __folio_alloc_noprof+0x14/0x80 [ 158.188396][ T4441] folio_prealloc+0x46/0x220 [ 158.188414][ T4441] do_pte_missing+0x1e80/0x44f0 [ 158.188432][ T4441] ? _raw_spin_unlock+0x45/0x60 [ 158.188457][ T4441] ? pte_marker_clear+0x1b0/0x1b0 [ 158.188474][ T4441] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 158.188500][ T4441] ? walk_pgd_range+0x1b58/0x1c20 [ 158.188519][ T4441] ? __pte_offset_map+0x1b0/0x230 [ 158.188538][ T4441] ? pte_offset_map_rw_nolock+0xba/0x110 [ 158.188558][ T4441] handle_mm_fault+0x11b8/0x1bf0 [ 158.188581][ T4441] ? __kasan_check_write+0x18/0x20 [ 158.188607][ T4441] ? __cfi_handle_mm_fault+0x10/0x10 [ 158.188631][ T4441] ? follow_page_pte+0x4b9/0xbc0 [ 158.188651][ T4441] ? gup_must_unshare+0x1e0/0x1e0 [ 158.188669][ T4441] ? vma_is_secretmem+0x11/0x50 [ 158.188688][ T4441] __get_user_pages+0x1170/0x22b0 [ 158.188709][ T4441] ? populate_vma_page_range+0x220/0x220 [ 158.188727][ T4441] ? down_read+0x7f/0xe0 [ 158.188743][ T4441] ? __cfi_down_read+0x10/0x10 [ 158.188760][ T4441] __mm_populate+0x2f8/0x430 [ 158.188779][ T4441] do_mlock+0x7eb/0xa00 [ 158.188799][ T4441] ? fput+0x1a4/0x240 [ 158.188815][ T4441] ? lru_gen_add_folio+0x860/0x860 [ 158.188833][ T4441] ? ksys_write+0x1f3/0x260 [ 158.188854][ T4441] ? __cfi_ksys_write+0x10/0x10 [ 158.188877][ T4441] ? __kasan_check_read+0x15/0x20 [ 158.188900][ T4441] __x64_sys_mlock+0x64/0x80 [ 158.188919][ T4441] x64_sys_call+0x670/0x2ee0 [ 158.188951][ T4441] do_syscall_64+0x57/0xf0 [ 158.188973][ T4441] ? clear_bhb_loop+0x50/0xa0 [ 158.188997][ T4441] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 158.189019][ T4441] RIP: 0033:0x7fb58099c799 [ 158.189036][ T4441] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 158.189053][ T4441] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 158.189075][ T4441] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 158.189090][ T4441] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 158.189104][ T4441] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 158.189118][ T4441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 158.189130][ T4441] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 158.189148][ T4441] [ 159.227753][ T36] kauditd_printk_skb: 79664 callbacks suppressed [ 159.227817][ T36] audit: type=1400 audit(2000000056.034:138137): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.233996][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 159.234312][ T36] audit: type=1400 audit(2000000056.034:138138): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.255737][ T149] audit: audit_lost=24689 audit_rate_limit=0 audit_backlog_limit=64 [ 159.262137][ T36] audit: type=1400 audit(2000000056.034:138139): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.283304][ T149] audit: backlog limit exceeded [ 159.291236][ T36] audit: type=1400 audit(2000000056.034:138140): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.312776][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 159.317202][ T36] audit: type=1400 audit(2000000056.034:138141): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.338497][ T149] audit: audit_lost=24690 audit_rate_limit=0 audit_backlog_limit=64 [ 160.548687][ T4478] FAULT_INJECTION: forcing a failure. [ 160.548687][ T4478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.562489][ T4478] CPU: 0 UID: 0 PID: 4478 Comm: syz.3.1627 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 160.562518][ T4478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 160.562530][ T4478] Call Trace: [ 160.562537][ T4478] [ 160.562545][ T4478] __dump_stack+0x21/0x30 [ 160.562572][ T4478] dump_stack_lvl+0x140/0x1c0 [ 160.562594][ T4478] ? __cfi_dump_stack_lvl+0x10/0x10 [ 160.562617][ T4478] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 160.562639][ T4478] dump_stack+0x19/0x20 [ 160.562659][ T4478] should_fail_ex+0x3d7/0x530 [ 160.562681][ T4478] should_fail_alloc_page+0xec/0x110 [ 160.562700][ T4478] __alloc_pages_noprof+0x1c0/0x7e0 [ 160.562720][ T4478] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 160.562744][ T4478] __folio_alloc_noprof+0x14/0x80 [ 160.562764][ T4478] folio_prealloc+0x46/0x220 [ 160.562783][ T4478] do_pte_missing+0x1e80/0x44f0 [ 160.562804][ T4478] ? pte_marker_clear+0x1b0/0x1b0 [ 160.562828][ T4478] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 160.562854][ T4478] ? __schedule+0x1357/0x1ea0 [ 160.562878][ T4478] ? __pte_offset_map+0x1b0/0x230 [ 160.562901][ T4478] ? pte_offset_map_rw_nolock+0xba/0x110 [ 160.562923][ T4478] handle_mm_fault+0x11b8/0x1bf0 [ 160.562948][ T4478] ? __kasan_check_write+0x18/0x20 [ 160.562972][ T4478] ? __cfi_handle_mm_fault+0x10/0x10 [ 160.562997][ T4478] ? follow_page_pte+0x4b9/0xbc0 [ 160.563017][ T4478] ? gup_must_unshare+0x1e0/0x1e0 [ 160.563036][ T4478] ? __get_user_pages+0x8c3/0x22b0 [ 160.563054][ T4478] __get_user_pages+0x1170/0x22b0 [ 160.563076][ T4478] ? populate_vma_page_range+0x220/0x220 [ 160.563095][ T4478] ? down_read+0x7f/0xe0 [ 160.563112][ T4478] ? __cfi_down_read+0x10/0x10 [ 160.563130][ T4478] __mm_populate+0x2f8/0x430 [ 160.563148][ T4478] do_mlock+0x7eb/0xa00 [ 160.563166][ T4478] ? fput+0x1a4/0x240 [ 160.563184][ T4478] ? lru_gen_add_folio+0x860/0x860 [ 160.563204][ T4478] ? ksys_write+0x1f3/0x260 [ 160.563225][ T4478] ? xfd_validate_state+0x68/0x140 [ 160.563247][ T4478] ? __cfi_ksys_write+0x10/0x10 [ 160.563269][ T4478] ? __kasan_check_read+0x15/0x20 [ 160.563291][ T4478] __x64_sys_mlock+0x64/0x80 [ 160.563311][ T4478] x64_sys_call+0x670/0x2ee0 [ 160.563334][ T4478] do_syscall_64+0x57/0xf0 [ 160.563355][ T4478] ? clear_bhb_loop+0x50/0xa0 [ 160.563377][ T4478] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 160.563399][ T4478] RIP: 0033:0x7f44ae99c799 [ 160.563414][ T4478] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 160.563429][ T4478] RSP: 002b:00007f44af8d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 160.563450][ T4478] RAX: ffffffffffffffda RBX: 00007f44aec15fa0 RCX: 00007f44ae99c799 [ 160.563469][ T4478] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 160.563482][ T4478] RBP: 00007f44af8d6090 R08: 0000000000000000 R09: 0000000000000000 [ 160.563496][ T4478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 160.563508][ T4478] R13: 00007f44aec16038 R14: 00007f44aec15fa0 R15: 00007ffd9b52ca48 [ 160.563524][ T4478] [ 160.941053][ T4492] syzkaller0: entered promiscuous mode [ 161.753788][ T4511] FAULT_INJECTION: forcing a failure. [ 161.753788][ T4511] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 161.767084][ T4511] CPU: 1 UID: 0 PID: 4511 Comm: syz.2.1639 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 161.767112][ T4511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 161.767123][ T4511] Call Trace: [ 161.767130][ T4511] [ 161.767139][ T4511] __dump_stack+0x21/0x30 [ 161.767168][ T4511] dump_stack_lvl+0x140/0x1c0 [ 161.767189][ T4511] ? __cfi_dump_stack_lvl+0x10/0x10 [ 161.767211][ T4511] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 161.767232][ T4511] dump_stack+0x19/0x20 [ 161.767252][ T4511] should_fail_ex+0x3d7/0x530 [ 161.767274][ T4511] should_fail_alloc_page+0xec/0x110 [ 161.767292][ T4511] __alloc_pages_noprof+0x1c0/0x7e0 [ 161.767313][ T4511] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 161.767337][ T4511] __folio_alloc_noprof+0x14/0x80 [ 161.767356][ T4511] folio_prealloc+0x46/0x220 [ 161.767374][ T4511] do_pte_missing+0x1e80/0x44f0 [ 161.767391][ T4511] ? _raw_spin_unlock+0x45/0x60 [ 161.767415][ T4511] ? pte_marker_clear+0x1b0/0x1b0 [ 161.767433][ T4511] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 161.767460][ T4511] ? __pte_offset_map+0x1b0/0x230 [ 161.767482][ T4511] ? pte_offset_map_rw_nolock+0xba/0x110 [ 161.767503][ T4511] handle_mm_fault+0x11b8/0x1bf0 [ 161.767528][ T4511] ? __kasan_check_write+0x18/0x20 [ 161.767561][ T4511] ? __cfi_handle_mm_fault+0x10/0x10 [ 161.767586][ T4511] ? follow_page_pte+0x4b9/0xbc0 [ 161.767606][ T4511] ? gup_must_unshare+0x1e0/0x1e0 [ 161.767625][ T4511] ? vma_is_secretmem+0x11/0x50 [ 161.767646][ T4511] __get_user_pages+0x1170/0x22b0 [ 161.767668][ T4511] ? populate_vma_page_range+0x220/0x220 [ 161.767687][ T4511] ? down_read+0x7f/0xe0 [ 161.767704][ T4511] ? __cfi_down_read+0x10/0x10 [ 161.767722][ T4511] __mm_populate+0x2f8/0x430 [ 161.767741][ T4511] do_mlock+0x7eb/0xa00 [ 161.767761][ T4511] ? fput+0x1a4/0x240 [ 161.767778][ T4511] ? lru_gen_add_folio+0x860/0x860 [ 161.767798][ T4511] ? ksys_write+0x1f3/0x260 [ 161.767821][ T4511] ? __cfi_ksys_write+0x10/0x10 [ 161.767843][ T4511] ? __kasan_check_read+0x15/0x20 [ 161.767865][ T4511] __x64_sys_mlock+0x64/0x80 [ 161.767884][ T4511] x64_sys_call+0x670/0x2ee0 [ 161.767906][ T4511] do_syscall_64+0x57/0xf0 [ 161.767928][ T4511] ? clear_bhb_loop+0x50/0xa0 [ 161.767952][ T4511] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 161.767974][ T4511] RIP: 0033:0x7fed23b9c799 [ 161.767990][ T4511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 161.768006][ T4511] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 161.768029][ T4511] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 161.768044][ T4511] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 161.768058][ T4511] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 161.768070][ T4511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.768082][ T4511] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 161.768099][ T4511] [ 162.372967][ T4520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=4520 comm=syz.0.1643 [ 162.394489][ T4522] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1644'. [ 162.421812][ T4522] netlink: 124 bytes leftover after parsing attributes in process `syz.1.1644'. [ 162.520319][ T4531] FAULT_INJECTION: forcing a failure. [ 162.520319][ T4531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.533663][ T4531] CPU: 1 UID: 0 PID: 4531 Comm: syz.1.1648 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 162.533691][ T4531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 162.533702][ T4531] Call Trace: [ 162.533709][ T4531] [ 162.533717][ T4531] __dump_stack+0x21/0x30 [ 162.533745][ T4531] dump_stack_lvl+0x140/0x1c0 [ 162.533767][ T4531] ? __cfi_dump_stack_lvl+0x10/0x10 [ 162.533790][ T4531] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 162.533812][ T4531] dump_stack+0x19/0x20 [ 162.533833][ T4531] should_fail_ex+0x3d7/0x530 [ 162.533854][ T4531] should_fail_alloc_page+0xec/0x110 [ 162.533872][ T4531] __alloc_pages_noprof+0x1c0/0x7e0 [ 162.533892][ T4531] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 162.533915][ T4531] __folio_alloc_noprof+0x14/0x80 [ 162.533935][ T4531] folio_prealloc+0x46/0x220 [ 162.533953][ T4531] do_pte_missing+0x1e80/0x44f0 [ 162.533971][ T4531] ? _raw_spin_unlock+0x45/0x60 [ 162.533995][ T4531] ? pte_marker_clear+0x1b0/0x1b0 [ 162.534013][ T4531] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 162.534041][ T4531] ? __pte_offset_map+0x1b0/0x230 [ 162.534062][ T4531] ? pte_offset_map_rw_nolock+0xba/0x110 [ 162.534084][ T4531] handle_mm_fault+0x11b8/0x1bf0 [ 162.534109][ T4531] ? __kasan_check_write+0x18/0x20 [ 162.534135][ T4531] ? __cfi_handle_mm_fault+0x10/0x10 [ 162.534160][ T4531] ? follow_page_pte+0x4b9/0xbc0 [ 162.534180][ T4531] ? gup_must_unshare+0x1e0/0x1e0 [ 162.534199][ T4531] ? vma_is_secretmem+0x11/0x50 [ 162.534220][ T4531] __get_user_pages+0x1170/0x22b0 [ 162.534252][ T4531] ? populate_vma_page_range+0x220/0x220 [ 162.534274][ T4531] ? down_read+0x7f/0xe0 [ 162.534291][ T4531] ? __cfi_down_read+0x10/0x10 [ 162.534310][ T4531] __mm_populate+0x2f8/0x430 [ 162.534329][ T4531] do_mlock+0x7eb/0xa00 [ 162.534350][ T4531] ? fput+0x1a4/0x240 [ 162.534368][ T4531] ? lru_gen_add_folio+0x860/0x860 [ 162.534389][ T4531] ? ksys_write+0x1f3/0x260 [ 162.534412][ T4531] ? __cfi_ksys_write+0x10/0x10 [ 162.534441][ T4531] ? __kasan_check_read+0x15/0x20 [ 162.534464][ T4531] __x64_sys_mlock+0x64/0x80 [ 162.534485][ T4531] x64_sys_call+0x670/0x2ee0 [ 162.534508][ T4531] do_syscall_64+0x57/0xf0 [ 162.534529][ T4531] ? clear_bhb_loop+0x50/0xa0 [ 162.534553][ T4531] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 162.534575][ T4531] RIP: 0033:0x7fb58099c799 [ 162.534591][ T4531] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 162.534608][ T4531] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 162.534630][ T4531] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 162.534645][ T4531] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 162.534658][ T4531] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 162.534678][ T4531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 162.534691][ T4531] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 162.534708][ T4531] [ 163.069750][ T4540] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1652'. [ 163.474618][ T4553] FAULT_INJECTION: forcing a failure. [ 163.474618][ T4553] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.488433][ T4553] CPU: 1 UID: 0 PID: 4553 Comm: syz.2.1658 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 163.488460][ T4553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 163.488471][ T4553] Call Trace: [ 163.488478][ T4553] [ 163.488485][ T4553] __dump_stack+0x21/0x30 [ 163.488511][ T4553] dump_stack_lvl+0x140/0x1c0 [ 163.488530][ T4553] ? __cfi_dump_stack_lvl+0x10/0x10 [ 163.488552][ T4553] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 163.488575][ T4553] dump_stack+0x19/0x20 [ 163.488595][ T4553] should_fail_ex+0x3d7/0x530 [ 163.488615][ T4553] should_fail_alloc_page+0xec/0x110 [ 163.488633][ T4553] __alloc_pages_noprof+0x1c0/0x7e0 [ 163.488652][ T4553] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 163.488675][ T4553] __folio_alloc_noprof+0x14/0x80 [ 163.488703][ T4553] folio_prealloc+0x46/0x220 [ 163.488721][ T4553] do_pte_missing+0x1e80/0x44f0 [ 163.488740][ T4553] ? finish_task_switch+0x1d9/0x760 [ 163.488762][ T4553] ? pte_marker_clear+0x1b0/0x1b0 [ 163.488780][ T4553] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 163.488808][ T4553] ? irqentry_exit+0x4a/0x60 [ 163.488827][ T4553] ? __pte_offset_map+0x1b0/0x230 [ 163.488849][ T4553] ? pte_offset_map_rw_nolock+0xba/0x110 [ 163.488871][ T4553] handle_mm_fault+0x11b8/0x1bf0 [ 163.488897][ T4553] ? __kasan_check_write+0x18/0x20 [ 163.488922][ T4553] ? __cfi_handle_mm_fault+0x10/0x10 [ 163.488947][ T4553] ? follow_page_pte+0x4b9/0xbc0 [ 163.488968][ T4553] ? gup_must_unshare+0x1e0/0x1e0 [ 163.488987][ T4553] ? vma_is_secretmem+0x11/0x50 [ 163.489009][ T4553] __get_user_pages+0x1170/0x22b0 [ 163.489031][ T4553] ? populate_vma_page_range+0x220/0x220 [ 163.489049][ T4553] ? down_read+0x7f/0xe0 [ 163.489067][ T4553] ? __cfi_down_read+0x10/0x10 [ 163.489086][ T4553] __mm_populate+0x2f8/0x430 [ 163.489104][ T4553] do_mlock+0x7eb/0xa00 [ 163.489124][ T4553] ? fput+0x1a4/0x240 [ 163.489142][ T4553] ? lru_gen_add_folio+0x860/0x860 [ 163.489161][ T4553] ? ksys_write+0x1f3/0x260 [ 163.489184][ T4553] ? __cfi_ksys_write+0x10/0x10 [ 163.489208][ T4553] ? __kasan_check_read+0x15/0x20 [ 163.489230][ T4553] __x64_sys_mlock+0x64/0x80 [ 163.489249][ T4553] x64_sys_call+0x670/0x2ee0 [ 163.489272][ T4553] do_syscall_64+0x57/0xf0 [ 163.489294][ T4553] ? clear_bhb_loop+0x50/0xa0 [ 163.489317][ T4553] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 163.489337][ T4553] RIP: 0033:0x7fed23b9c799 [ 163.489354][ T4553] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 163.489373][ T4553] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 163.489395][ T4553] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 163.489410][ T4553] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 163.489423][ T4553] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 163.489435][ T4553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.489447][ T4553] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 163.489463][ T4553] [ 164.488501][ T4580] FAULT_INJECTION: forcing a failure. [ 164.488501][ T4580] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 164.501825][ T4580] CPU: 1 UID: 0 PID: 4580 Comm: syz.2.1668 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 164.501852][ T4580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 164.501863][ T4580] Call Trace: [ 164.501870][ T4580] [ 164.501878][ T4580] __dump_stack+0x21/0x30 [ 164.501906][ T4580] dump_stack_lvl+0x140/0x1c0 [ 164.501927][ T4580] ? __cfi_dump_stack_lvl+0x10/0x10 [ 164.501950][ T4580] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 164.501973][ T4580] dump_stack+0x19/0x20 [ 164.501994][ T4580] should_fail_ex+0x3d7/0x530 [ 164.502016][ T4580] should_fail_alloc_page+0xec/0x110 [ 164.502034][ T4580] __alloc_pages_noprof+0x1c0/0x7e0 [ 164.502054][ T4580] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 164.502078][ T4580] __folio_alloc_noprof+0x14/0x80 [ 164.502098][ T4580] folio_prealloc+0x46/0x220 [ 164.502116][ T4580] do_pte_missing+0x1e80/0x44f0 [ 164.502135][ T4580] ? _raw_spin_unlock+0x45/0x60 [ 164.502159][ T4580] ? pte_marker_clear+0x1b0/0x1b0 [ 164.502177][ T4580] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 164.502204][ T4580] ? __pte_offset_map+0x1b0/0x230 [ 164.502226][ T4580] ? pte_offset_map_rw_nolock+0xba/0x110 [ 164.502248][ T4580] handle_mm_fault+0x11b8/0x1bf0 [ 164.502273][ T4580] ? __kasan_check_write+0x18/0x20 [ 164.502298][ T4580] ? __cfi_handle_mm_fault+0x10/0x10 [ 164.502331][ T4580] ? follow_page_pte+0x4b9/0xbc0 [ 164.502351][ T4580] ? gup_must_unshare+0x1e0/0x1e0 [ 164.502370][ T4580] ? vma_is_secretmem+0x11/0x50 [ 164.502391][ T4580] __get_user_pages+0x1170/0x22b0 [ 164.502412][ T4580] ? populate_vma_page_range+0x220/0x220 [ 164.502430][ T4580] ? down_read+0x7f/0xe0 [ 164.502448][ T4580] ? __cfi_down_read+0x10/0x10 [ 164.502466][ T4580] __mm_populate+0x2f8/0x430 [ 164.502485][ T4580] do_mlock+0x7eb/0xa00 [ 164.502505][ T4580] ? fput+0x1a4/0x240 [ 164.502523][ T4580] ? lru_gen_add_folio+0x860/0x860 [ 164.502543][ T4580] ? ksys_write+0x1f3/0x260 [ 164.502564][ T4580] ? __cfi_ksys_write+0x10/0x10 [ 164.502588][ T4580] ? __kasan_check_read+0x15/0x20 [ 164.502615][ T4580] __x64_sys_mlock+0x64/0x80 [ 164.502634][ T4580] x64_sys_call+0x670/0x2ee0 [ 164.502657][ T4580] do_syscall_64+0x57/0xf0 [ 164.502679][ T4580] ? clear_bhb_loop+0x50/0xa0 [ 164.502701][ T4580] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 164.502722][ T4580] RIP: 0033:0x7fed23b9c799 [ 164.502739][ T4580] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 164.502755][ T4580] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 164.502776][ T4580] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 164.502792][ T4580] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 164.502806][ T4580] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 164.502820][ T4580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 164.502832][ T4580] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 164.502847][ T4580] [ 164.567400][ T36] kauditd_printk_skb: 88064 callbacks suppressed [ 164.567419][ T36] audit: type=1400 audit(2000000060.989:186083): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 164.610933][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 164.661097][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 164.662029][ T149] audit: audit_lost=38065 audit_rate_limit=0 audit_backlog_limit=64 [ 164.669187][ T36] audit: type=1400 audit(2000000061.045:186085): avc: denied { read write } for pid=4581 comm="syz.3.1669" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 164.671167][ T149] audit: backlog limit exceeded [ 164.681914][ T291] audit: audit_lost=38066 audit_rate_limit=0 audit_backlog_limit=64 [ 164.684618][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 164.689101][ T36] audit: type=1400 audit(2000000061.045:186086): avc: denied { mounton } for pid=4581 comm="syz.3.1669" path="/436/file0" dev="tmpfs" ino=2391 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 164.693793][ T149] audit: audit_lost=38067 audit_rate_limit=0 audit_backlog_limit=64 [ 164.839880][ T4590] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1124 sclass=netlink_route_socket pid=4590 comm=syz.0.1672 [ 164.903101][ T4591] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1672'. [ 166.089725][ T4606] FAULT_INJECTION: forcing a failure. [ 166.089725][ T4606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 166.103510][ T4606] CPU: 1 UID: 0 PID: 4606 Comm: syz.1.1679 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 166.103539][ T4606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 166.103551][ T4606] Call Trace: [ 166.103559][ T4606] [ 166.103566][ T4606] __dump_stack+0x21/0x30 [ 166.103594][ T4606] dump_stack_lvl+0x140/0x1c0 [ 166.103616][ T4606] ? __cfi_dump_stack_lvl+0x10/0x10 [ 166.103639][ T4606] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 166.103662][ T4606] dump_stack+0x19/0x20 [ 166.103682][ T4606] should_fail_ex+0x3d7/0x530 [ 166.103705][ T4606] should_fail_alloc_page+0xec/0x110 [ 166.103724][ T4606] __alloc_pages_noprof+0x1c0/0x7e0 [ 166.103744][ T4606] ? __schedule+0x1357/0x1ea0 [ 166.103767][ T4606] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 166.103791][ T4606] __folio_alloc_noprof+0x14/0x80 [ 166.103812][ T4606] folio_prealloc+0x46/0x220 [ 166.103831][ T4606] do_pte_missing+0x1e80/0x44f0 [ 166.103851][ T4606] ? pte_marker_clear+0x1b0/0x1b0 [ 166.103869][ T4606] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 166.103895][ T4606] ? rcu_read_unlock_special+0xb7/0x420 [ 166.103919][ T4606] ? __pte_offset_map+0x1b0/0x230 [ 166.103942][ T4606] ? pte_offset_map_rw_nolock+0xba/0x110 [ 166.103964][ T4606] handle_mm_fault+0x11b8/0x1bf0 [ 166.103988][ T4606] ? __kasan_check_write+0x18/0x20 [ 166.104013][ T4606] ? __cfi_handle_mm_fault+0x10/0x10 [ 166.104039][ T4606] ? follow_page_pte+0x4b9/0xbc0 [ 166.104059][ T4606] ? gup_must_unshare+0x1e0/0x1e0 [ 166.104078][ T4606] ? vma_is_secretmem+0x11/0x50 [ 166.104098][ T4606] __get_user_pages+0x1170/0x22b0 [ 166.104121][ T4606] ? populate_vma_page_range+0x220/0x220 [ 166.104140][ T4606] ? down_read+0x7f/0xe0 [ 166.104157][ T4606] ? __cfi_down_read+0x10/0x10 [ 166.104175][ T4606] __mm_populate+0x2f8/0x430 [ 166.104194][ T4606] do_mlock+0x7eb/0xa00 [ 166.104215][ T4606] ? fput+0x1a4/0x240 [ 166.104233][ T4606] ? lru_gen_add_folio+0x860/0x860 [ 166.104250][ T4606] ? ksys_write+0x1f3/0x260 [ 166.104267][ T4606] ? xfd_validate_state+0x68/0x140 [ 166.104285][ T4606] ? __cfi_ksys_write+0x10/0x10 [ 166.104302][ T4606] ? __kasan_check_read+0x15/0x20 [ 166.104320][ T4606] __x64_sys_mlock+0x64/0x80 [ 166.104342][ T4606] x64_sys_call+0x670/0x2ee0 [ 166.104366][ T4606] do_syscall_64+0x57/0xf0 [ 166.104387][ T4606] ? clear_bhb_loop+0x50/0xa0 [ 166.104411][ T4606] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 166.104433][ T4606] RIP: 0033:0x7fb58099c799 [ 166.104449][ T4606] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 166.104470][ T4606] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 166.104520][ T4606] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 166.104535][ T4606] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 166.104550][ T4606] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 166.104562][ T4606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 166.104574][ T4606] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 166.104591][ T4606] [ 166.455474][ T4615] netlink: 'syz.3.1683': attribute type 29 has an invalid length. [ 166.466925][ T4615] netlink: 64138 bytes leftover after parsing attributes in process `syz.3.1683'. [ 166.694928][ T4621] netlink: 'syz.3.1683': attribute type 29 has an invalid length. [ 166.702896][ T4621] netlink: 64138 bytes leftover after parsing attributes in process `syz.3.1683'. [ 168.728031][ T4676] FAULT_INJECTION: forcing a failure. [ 168.728031][ T4676] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 168.741841][ T4676] CPU: 1 UID: 0 PID: 4676 Comm: syz.1.1706 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 168.741870][ T4676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 168.741881][ T4676] Call Trace: [ 168.741893][ T4676] [ 168.741912][ T4676] __dump_stack+0x21/0x30 [ 168.741981][ T4676] dump_stack_lvl+0x140/0x1c0 [ 168.742004][ T4676] ? __cfi_dump_stack_lvl+0x10/0x10 [ 168.742027][ T4676] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 168.742049][ T4676] dump_stack+0x19/0x20 [ 168.742069][ T4676] should_fail_ex+0x3d7/0x530 [ 168.742090][ T4676] should_fail_alloc_page+0xec/0x110 [ 168.742107][ T4676] __alloc_pages_noprof+0x1c0/0x7e0 [ 168.742126][ T4676] ? __switch_to_asm+0x3d/0x70 [ 168.742149][ T4676] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 168.742172][ T4676] __folio_alloc_noprof+0x14/0x80 [ 168.742191][ T4676] folio_prealloc+0x46/0x220 [ 168.742209][ T4676] do_pte_missing+0x1e80/0x44f0 [ 168.742230][ T4676] ? pte_marker_clear+0x1b0/0x1b0 [ 168.742249][ T4676] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 168.742274][ T4676] ? irqentry_exit+0x4a/0x60 [ 168.742293][ T4676] ? __pte_offset_map+0x1b0/0x230 [ 168.742315][ T4676] ? pte_offset_map_rw_nolock+0xba/0x110 [ 168.742337][ T4676] handle_mm_fault+0x11b8/0x1bf0 [ 168.742361][ T4676] ? __kasan_check_write+0x18/0x20 [ 168.742393][ T4676] ? __cfi_handle_mm_fault+0x10/0x10 [ 168.742417][ T4676] ? follow_page_pte+0x4b9/0xbc0 [ 168.742438][ T4676] ? gup_must_unshare+0x1e0/0x1e0 [ 168.742457][ T4676] ? vma_is_secretmem+0x11/0x50 [ 168.742477][ T4676] __get_user_pages+0x1170/0x22b0 [ 168.742499][ T4676] ? populate_vma_page_range+0x220/0x220 [ 168.742518][ T4676] ? down_read+0x7f/0xe0 [ 168.742535][ T4676] ? __cfi_down_read+0x10/0x10 [ 168.742554][ T4676] __mm_populate+0x2f8/0x430 [ 168.742572][ T4676] do_mlock+0x7eb/0xa00 [ 168.742592][ T4676] ? lru_gen_add_folio+0x860/0x860 [ 168.742612][ T4676] ? ksys_write+0x1f3/0x260 [ 168.742634][ T4676] ? xfd_validate_state+0x68/0x140 [ 168.742661][ T4676] ? __cfi_ksys_write+0x10/0x10 [ 168.742683][ T4676] ? __kasan_check_write+0x18/0x20 [ 168.742705][ T4676] __x64_sys_mlock+0x64/0x80 [ 168.742724][ T4676] x64_sys_call+0x670/0x2ee0 [ 168.742748][ T4676] do_syscall_64+0x57/0xf0 [ 168.742768][ T4676] ? clear_bhb_loop+0x50/0xa0 [ 168.742793][ T4676] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 168.742814][ T4676] RIP: 0033:0x7fb58099c799 [ 168.742831][ T4676] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 168.742847][ T4676] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 168.742869][ T4676] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 168.742884][ T4676] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 168.742897][ T4676] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 168.742910][ T4676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 168.742921][ T4676] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 168.742936][ T4676] [ 169.140878][ T4689] netlink: 'syz.1.1711': attribute type 4 has an invalid length. [ 169.503500][ T4708] FAULT_INJECTION: forcing a failure. [ 169.503500][ T4708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 169.527663][ T4708] CPU: 0 UID: 0 PID: 4708 Comm: syz.2.1719 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 169.527693][ T4708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 169.527705][ T4708] Call Trace: [ 169.527712][ T4708] [ 169.527720][ T4708] __dump_stack+0x21/0x30 [ 169.527749][ T4708] dump_stack_lvl+0x140/0x1c0 [ 169.527770][ T4708] ? __cfi_dump_stack_lvl+0x10/0x10 [ 169.527792][ T4708] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 169.527814][ T4708] dump_stack+0x19/0x20 [ 169.527834][ T4708] should_fail_ex+0x3d7/0x530 [ 169.527857][ T4708] should_fail_alloc_page+0xec/0x110 [ 169.527876][ T4708] __alloc_pages_noprof+0x1c0/0x7e0 [ 169.527895][ T4708] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 169.527920][ T4708] __folio_alloc_noprof+0x14/0x80 [ 169.527941][ T4708] folio_prealloc+0x46/0x220 [ 169.527959][ T4708] do_pte_missing+0x1e80/0x44f0 [ 169.527978][ T4708] ? _raw_spin_unlock+0x45/0x60 [ 169.528002][ T4708] ? pte_marker_clear+0x1b0/0x1b0 [ 169.528020][ T4708] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 169.528047][ T4708] ? __pte_offset_map+0x1b0/0x230 [ 169.528068][ T4708] ? pte_offset_map_rw_nolock+0xba/0x110 [ 169.528091][ T4708] handle_mm_fault+0x11b8/0x1bf0 [ 169.528116][ T4708] ? __kasan_check_write+0x18/0x20 [ 169.528142][ T4708] ? __cfi_handle_mm_fault+0x10/0x10 [ 169.528166][ T4708] ? follow_page_pte+0x4b9/0xbc0 [ 169.528187][ T4708] ? gup_must_unshare+0x1e0/0x1e0 [ 169.528207][ T4708] ? vma_is_secretmem+0x11/0x50 [ 169.528228][ T4708] __get_user_pages+0x1170/0x22b0 [ 169.528250][ T4708] ? populate_vma_page_range+0x220/0x220 [ 169.528269][ T4708] ? down_read+0x7f/0xe0 [ 169.528287][ T4708] ? __cfi_down_read+0x10/0x10 [ 169.528313][ T4708] __mm_populate+0x2f8/0x430 [ 169.528332][ T4708] do_mlock+0x7eb/0xa00 [ 169.528353][ T4708] ? fput+0x1a4/0x240 [ 169.528372][ T4708] ? lru_gen_add_folio+0x860/0x860 [ 169.528392][ T4708] ? ksys_write+0x1f3/0x260 [ 169.528415][ T4708] ? __cfi_ksys_write+0x10/0x10 [ 169.528438][ T4708] ? __kasan_check_read+0x15/0x20 [ 169.528460][ T4708] __x64_sys_mlock+0x64/0x80 [ 169.528480][ T4708] x64_sys_call+0x670/0x2ee0 [ 169.528504][ T4708] do_syscall_64+0x57/0xf0 [ 169.528524][ T4708] ? clear_bhb_loop+0x50/0xa0 [ 169.528547][ T4708] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 169.528569][ T4708] RIP: 0033:0x7fed23b9c799 [ 169.528584][ T4708] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 169.528600][ T4708] RSP: 002b:00007fed24a79028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 169.528622][ T4708] RAX: ffffffffffffffda RBX: 00007fed23e15fa0 RCX: 00007fed23b9c799 [ 169.528637][ T4708] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 169.528650][ T4708] RBP: 00007fed24a79090 R08: 0000000000000000 R09: 0000000000000000 [ 169.528663][ T4708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 169.528676][ T4708] R13: 00007fed23e16038 R14: 00007fed23e15fa0 R15: 00007fff1ded3138 [ 169.528693][ T4708] [ 169.931500][ T36] kauditd_printk_skb: 69458 callbacks suppressed [ 169.931516][ T36] audit: type=1400 audit(2000000066.074:232524): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 169.977854][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 169.994269][ T149] audit: audit_lost=45741 audit_rate_limit=0 audit_backlog_limit=64 [ 170.005847][ T36] audit: type=1400 audit(2000000066.093:232525): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.009478][ T149] audit: backlog limit exceeded [ 170.027238][ T36] audit: type=1400 audit(2000000066.093:232526): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.053248][ T36] audit: type=1400 audit(2000000066.103:232527): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.065325][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.074424][ T36] audit: type=1400 audit(2000000066.103:232528): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.088324][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.421254][ T4731] FAULT_INJECTION: forcing a failure. [ 170.421254][ T4731] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 170.434616][ T4731] CPU: 0 UID: 0 PID: 4731 Comm: syz.1.1730 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 170.434645][ T4731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 170.434657][ T4731] Call Trace: [ 170.434665][ T4731] [ 170.434673][ T4731] __dump_stack+0x21/0x30 [ 170.434701][ T4731] dump_stack_lvl+0x140/0x1c0 [ 170.434722][ T4731] ? __cfi_dump_stack_lvl+0x10/0x10 [ 170.434744][ T4731] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 170.434766][ T4731] dump_stack+0x19/0x20 [ 170.434786][ T4731] should_fail_ex+0x3d7/0x530 [ 170.434808][ T4731] should_fail_alloc_page+0xec/0x110 [ 170.434826][ T4731] __alloc_pages_noprof+0x1c0/0x7e0 [ 170.434846][ T4731] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 170.434869][ T4731] __folio_alloc_noprof+0x14/0x80 [ 170.434889][ T4731] folio_prealloc+0x46/0x220 [ 170.434908][ T4731] do_pte_missing+0x1e80/0x44f0 [ 170.434926][ T4731] ? _raw_spin_unlock+0x45/0x60 [ 170.434950][ T4731] ? pte_marker_clear+0x1b0/0x1b0 [ 170.434968][ T4731] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 170.435025][ T4731] ? __pte_offset_map+0x1b0/0x230 [ 170.435047][ T4731] ? pte_offset_map_rw_nolock+0xba/0x110 [ 170.435071][ T4731] handle_mm_fault+0x11b8/0x1bf0 [ 170.435096][ T4731] ? __kasan_check_write+0x18/0x20 [ 170.435120][ T4731] ? __cfi_handle_mm_fault+0x10/0x10 [ 170.435145][ T4731] ? follow_page_pte+0x4b9/0xbc0 [ 170.435166][ T4731] ? gup_must_unshare+0x1e0/0x1e0 [ 170.435184][ T4731] ? vma_is_secretmem+0x11/0x50 [ 170.435205][ T4731] __get_user_pages+0x1170/0x22b0 [ 170.435226][ T4731] ? populate_vma_page_range+0x220/0x220 [ 170.435244][ T4731] ? down_read+0x7f/0xe0 [ 170.435261][ T4731] ? __cfi_down_read+0x10/0x10 [ 170.435280][ T4731] __mm_populate+0x2f8/0x430 [ 170.435299][ T4731] do_mlock+0x7eb/0xa00 [ 170.435319][ T4731] ? fput+0x1a4/0x240 [ 170.435344][ T4731] ? lru_gen_add_folio+0x860/0x860 [ 170.435364][ T4731] ? ksys_write+0x1f3/0x260 [ 170.435387][ T4731] ? __cfi_ksys_write+0x10/0x10 [ 170.435410][ T4731] ? __kasan_check_read+0x15/0x20 [ 170.435433][ T4731] __x64_sys_mlock+0x64/0x80 [ 170.435452][ T4731] x64_sys_call+0x670/0x2ee0 [ 170.435474][ T4731] do_syscall_64+0x57/0xf0 [ 170.435496][ T4731] ? clear_bhb_loop+0x50/0xa0 [ 170.435519][ T4731] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 170.435549][ T4731] RIP: 0033:0x7fb58099c799 [ 170.435565][ T4731] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 170.435582][ T4731] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 170.435604][ T4731] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 170.435616][ T4731] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 170.435626][ T4731] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 170.435636][ T4731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 170.435648][ T4731] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 170.435669][ T4731] [ 171.300322][ T4754] netlink: 'syz.0.1741': attribute type 5 has an invalid length. [ 171.308469][ T4754] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.1741'. [ 174.132949][ T4876] FAULT_INJECTION: forcing a failure. [ 174.132949][ T4876] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 174.146359][ T4876] CPU: 1 UID: 0 PID: 4876 Comm: syz.1.1789 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 174.146387][ T4876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 174.146400][ T4876] Call Trace: [ 174.146406][ T4876] [ 174.146414][ T4876] __dump_stack+0x21/0x30 [ 174.146443][ T4876] dump_stack_lvl+0x140/0x1c0 [ 174.146465][ T4876] ? __cfi_dump_stack_lvl+0x10/0x10 [ 174.146487][ T4876] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 174.146509][ T4876] dump_stack+0x19/0x20 [ 174.146529][ T4876] should_fail_ex+0x3d7/0x530 [ 174.146551][ T4876] should_fail_alloc_page+0xec/0x110 [ 174.146569][ T4876] __alloc_pages_noprof+0x1c0/0x7e0 [ 174.146590][ T4876] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 174.146613][ T4876] __folio_alloc_noprof+0x14/0x80 [ 174.146633][ T4876] folio_prealloc+0x46/0x220 [ 174.146651][ T4876] do_pte_missing+0x1e80/0x44f0 [ 174.146669][ T4876] ? _raw_spin_unlock+0x45/0x60 [ 174.146694][ T4876] ? pte_marker_clear+0x1b0/0x1b0 [ 174.146713][ T4876] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 174.146740][ T4876] ? __pte_offset_map+0x1b0/0x230 [ 174.146761][ T4876] ? pte_offset_map_rw_nolock+0xba/0x110 [ 174.146784][ T4876] handle_mm_fault+0x11b8/0x1bf0 [ 174.146818][ T4876] ? __kasan_check_write+0x18/0x20 [ 174.146843][ T4876] ? __cfi_handle_mm_fault+0x10/0x10 [ 174.146865][ T4876] ? follow_page_pte+0x4b9/0xbc0 [ 174.146887][ T4876] ? gup_must_unshare+0x1e0/0x1e0 [ 174.146906][ T4876] ? vma_is_secretmem+0x11/0x50 [ 174.146926][ T4876] __get_user_pages+0x1170/0x22b0 [ 174.146949][ T4876] ? populate_vma_page_range+0x220/0x220 [ 174.146967][ T4876] ? down_read+0x7f/0xe0 [ 174.146985][ T4876] ? __cfi_down_read+0x10/0x10 [ 174.147003][ T4876] __mm_populate+0x2f8/0x430 [ 174.147023][ T4876] do_mlock+0x7eb/0xa00 [ 174.147044][ T4876] ? fput+0x1a4/0x240 [ 174.147061][ T4876] ? lru_gen_add_folio+0x860/0x860 [ 174.147081][ T4876] ? ksys_write+0x1f3/0x260 [ 174.147105][ T4876] ? __cfi_ksys_write+0x10/0x10 [ 174.147128][ T4876] ? __kasan_check_read+0x15/0x20 [ 174.147151][ T4876] __x64_sys_mlock+0x64/0x80 [ 174.147170][ T4876] x64_sys_call+0x670/0x2ee0 [ 174.147194][ T4876] do_syscall_64+0x57/0xf0 [ 174.147215][ T4876] ? clear_bhb_loop+0x50/0xa0 [ 174.147239][ T4876] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 174.147261][ T4876] RIP: 0033:0x7fb58099c799 [ 174.147277][ T4876] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 174.147293][ T4876] RSP: 002b:00007fb5817c9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 174.147316][ T4876] RAX: ffffffffffffffda RBX: 00007fb580c15fa0 RCX: 00007fb58099c799 [ 174.147330][ T4876] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 174.147344][ T4876] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 174.147356][ T4876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 174.147369][ T4876] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 174.147387][ T4876] [ 175.127103][ T4905] IPv6: NLM_F_CREATE should be specified when creating new route [ 175.267042][ T36] kauditd_printk_skb: 47539 callbacks suppressed [ 175.267060][ T36] audit: type=1400 audit(2000000071.076:279068): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.273139][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 175.273595][ T36] audit: type=1400 audit(2000000071.085:279069): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.294623][ T149] audit: audit_lost=46076 audit_rate_limit=0 audit_backlog_limit=64 [ 175.301574][ T36] audit: type=1400 audit(2000000071.085:279070): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.322496][ T149] audit: backlog limit exceeded [ 175.330714][ T36] audit: type=1400 audit(2000000071.085:279071): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.352475][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 175.356847][ T36] audit: type=1400 audit(2000000071.085:279072): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.377863][ T149] audit: audit_lost=46077 audit_rate_limit=0 audit_backlog_limit=64 [ 175.812107][ T4936] sit0: entered promiscuous mode [ 175.817162][ T4936] netlink: 'syz.1.1816': attribute type 1 has an invalid length. [ 175.825195][ T4936] netlink: 9 bytes leftover after parsing attributes in process `syz.1.1816'. [ 175.849808][ T4940] FAULT_INJECTION: forcing a failure. [ 175.849808][ T4940] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 175.879202][ T4940] CPU: 1 UID: 0 PID: 4940 Comm: syz.1.1818 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 175.879233][ T4940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 175.879244][ T4940] Call Trace: [ 175.879251][ T4940] [ 175.879260][ T4940] __dump_stack+0x21/0x30 [ 175.879287][ T4940] dump_stack_lvl+0x140/0x1c0 [ 175.879308][ T4940] ? __cfi_dump_stack_lvl+0x10/0x10 [ 175.879330][ T4940] ? check_stack_object+0x12b/0x150 [ 175.879354][ T4940] dump_stack+0x19/0x20 [ 175.879373][ T4940] should_fail_ex+0x3d7/0x530 [ 175.879396][ T4940] should_fail+0xf/0x20 [ 175.879413][ T4940] should_fail_usercopy+0x1e/0x30 [ 175.879433][ T4940] _copy_to_user+0x24/0xa0 [ 175.879455][ T4940] simple_read_from_buffer+0xed/0x160 [ 175.879475][ T4940] proc_fail_nth_read+0x1aa/0x220 [ 175.879496][ T4940] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 175.879516][ T4940] ? bpf_lsm_file_permission+0xd/0x20 [ 175.879536][ T4940] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 175.879560][ T4940] vfs_read+0x289/0xcb0 [ 175.879583][ T4940] ? __cfi_vfs_read+0x10/0x10 [ 175.879604][ T4940] ? __kasan_check_write+0x18/0x20 [ 175.879628][ T4940] ? mutex_lock+0x97/0x1d0 [ 175.879653][ T4940] ? __cfi_mutex_lock+0x10/0x10 [ 175.879677][ T4940] ? __fget_files+0x2c5/0x340 [ 175.879704][ T4940] ksys_read+0x145/0x260 [ 175.879727][ T4940] ? __cfi_ksys_read+0x10/0x10 [ 175.879757][ T4940] ? fdget+0x188/0x1e0 [ 175.879781][ T4940] ? __kasan_check_read+0x15/0x20 [ 175.879804][ T4940] __x64_sys_read+0x7f/0x90 [ 175.879826][ T4940] x64_sys_call+0x2638/0x2ee0 [ 175.879850][ T4940] do_syscall_64+0x57/0xf0 [ 175.879871][ T4940] ? clear_bhb_loop+0x50/0xa0 [ 175.879894][ T4940] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 175.879916][ T4940] RIP: 0033:0x7fb58095cfce [ 175.879933][ T4940] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 175.879948][ T4940] RSP: 002b:00007fb5817c8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 175.879970][ T4940] RAX: ffffffffffffffda RBX: 00007fb5817c96c0 RCX: 00007fb58095cfce [ 175.879985][ T4940] RDX: 000000000000000f RSI: 00007fb5817c90a0 RDI: 0000000000000003 [ 175.879997][ T4940] RBP: 00007fb5817c9090 R08: 0000000000000000 R09: 0000000000000000 [ 175.880010][ T4940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.880022][ T4940] R13: 00007fb580c16038 R14: 00007fb580c15fa0 R15: 00007ffd8ac2dec8 [ 175.880039][ T4940] [ 177.326697][ T4976] netlink: 26148 bytes leftover after parsing attributes in process `syz.2.1831'. [ 177.335994][ T4976] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1831'. [ 178.499166][ T5000] netlink: 'syz.2.1841': attribute type 27 has an invalid length. [ 178.859660][ T329] bridge_slave_1: left allmulticast mode [ 178.865437][ T329] bridge_slave_1: left promiscuous mode [ 178.871388][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.748302][ T5011] FAULT_INJECTION: forcing a failure. [ 179.748302][ T5011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 179.762029][ T5011] CPU: 0 UID: 0 PID: 5011 Comm: syz.3.1847 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 179.762061][ T5011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 179.762073][ T5011] Call Trace: [ 179.762079][ T5011] [ 179.762086][ T5011] __dump_stack+0x21/0x30 [ 179.762114][ T5011] dump_stack_lvl+0x140/0x1c0 [ 179.762134][ T5011] ? __cfi_dump_stack_lvl+0x10/0x10 [ 179.762156][ T5011] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 179.762178][ T5011] dump_stack+0x19/0x20 [ 179.762198][ T5011] should_fail_ex+0x3d7/0x530 [ 179.762219][ T5011] should_fail_alloc_page+0xec/0x110 [ 179.762237][ T5011] __alloc_pages_noprof+0x1c0/0x7e0 [ 179.762257][ T5011] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 179.762282][ T5011] __folio_alloc_noprof+0x14/0x80 [ 179.762302][ T5011] folio_prealloc+0x46/0x220 [ 179.762320][ T5011] do_pte_missing+0x1e80/0x44f0 [ 179.762337][ T5011] ? _raw_spin_unlock+0x45/0x60 [ 179.762362][ T5011] ? pte_marker_clear+0x1b0/0x1b0 [ 179.762381][ T5011] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 179.762408][ T5011] ? __pte_offset_map+0x1b0/0x230 [ 179.762430][ T5011] ? pte_offset_map_rw_nolock+0xba/0x110 [ 179.762452][ T5011] handle_mm_fault+0x11b8/0x1bf0 [ 179.762476][ T5011] ? __kasan_check_write+0x18/0x20 [ 179.762501][ T5011] ? __cfi_handle_mm_fault+0x10/0x10 [ 179.762526][ T5011] ? follow_page_pte+0x4b9/0xbc0 [ 179.762546][ T5011] ? gup_must_unshare+0x1e0/0x1e0 [ 179.762565][ T5011] ? vma_is_secretmem+0x11/0x50 [ 179.762586][ T5011] __get_user_pages+0x1170/0x22b0 [ 179.762609][ T5011] ? populate_vma_page_range+0x220/0x220 [ 179.762627][ T5011] ? down_read+0x7f/0xe0 [ 179.762644][ T5011] ? __cfi_down_read+0x10/0x10 [ 179.762662][ T5011] __mm_populate+0x2f8/0x430 [ 179.762681][ T5011] do_mlock+0x7eb/0xa00 [ 179.762702][ T5011] ? fput+0x1a4/0x240 [ 179.762720][ T5011] ? lru_gen_add_folio+0x860/0x860 [ 179.762740][ T5011] ? ksys_write+0x1f3/0x260 [ 179.762761][ T5011] ? xfd_validate_state+0x68/0x140 [ 179.762784][ T5011] ? __cfi_ksys_write+0x10/0x10 [ 179.762808][ T5011] ? __kasan_check_read+0x15/0x20 [ 179.762838][ T5011] __x64_sys_mlock+0x64/0x80 [ 179.762858][ T5011] x64_sys_call+0x670/0x2ee0 [ 179.762881][ T5011] do_syscall_64+0x57/0xf0 [ 179.762903][ T5011] ? clear_bhb_loop+0x50/0xa0 [ 179.762925][ T5011] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 179.762946][ T5011] RIP: 0033:0x7f44ae99c799 [ 179.762963][ T5011] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 179.762978][ T5011] RSP: 002b:00007f44af8d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 179.763001][ T5011] RAX: ffffffffffffffda RBX: 00007f44aec15fa0 RCX: 00007f44ae99c799 [ 179.763016][ T5011] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 179.763029][ T5011] RBP: 00007f44af8d6090 R08: 0000000000000000 R09: 0000000000000000 [ 179.763041][ T5011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 179.763053][ T5011] R13: 00007f44aec16038 R14: 00007f44aec15fa0 R15: 00007ffd9b52ca48 [ 179.763069][ T5011] [ 180.275973][ T673] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 180.606423][ T36] kauditd_printk_skb: 70947 callbacks suppressed [ 180.606441][ T36] audit: type=1400 audit(2000000076.096:331116): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 180.612745][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 180.612818][ T36] audit: type=1400 audit(2000000076.096:331117): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 180.633999][ T149] audit: audit_lost=52379 audit_rate_limit=0 audit_backlog_limit=64 [ 180.634018][ T149] audit: backlog limit exceeded [ 180.643845][ T36] audit: type=1400 audit(2000000076.096:331118): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 180.661935][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 180.669769][ T36] audit: type=1400 audit(2000000076.096:331119): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 180.674571][ T149] audit: audit_lost=52380 audit_rate_limit=0 audit_backlog_limit=64 [ 180.695722][ T36] audit: type=1400 audit(2000000076.096:331120): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 185.945683][ T36] kauditd_printk_skb: 63677 callbacks suppressed [ 185.945703][ T36] audit: type=1400 audit(2000000081.106:391785): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 185.951682][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 185.952071][ T36] audit: type=1400 audit(2000000081.106:391786): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 185.973175][ T149] audit: audit_lost=53385 audit_rate_limit=0 audit_backlog_limit=64 [ 185.979773][ T36] audit: type=1400 audit(2000000081.106:391787): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.001350][ T149] audit: backlog limit exceeded [ 186.008974][ T36] audit: type=1400 audit(2000000081.106:391788): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.030608][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 186.034930][ T36] audit: type=1400 audit(2000000081.106:391789): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 186.056226][ T149] audit: audit_lost=53386 audit_rate_limit=0 audit_backlog_limit=64 [ 186.608975][ T5071] FAULT_INJECTION: forcing a failure. [ 186.608975][ T5071] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.633256][ T5071] CPU: 1 UID: 0 PID: 5071 Comm: syz.0.1866 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 186.633285][ T5071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 186.633296][ T5071] Call Trace: [ 186.633303][ T5071] [ 186.633312][ T5071] __dump_stack+0x21/0x30 [ 186.633355][ T5071] dump_stack_lvl+0x140/0x1c0 [ 186.633376][ T5071] ? __cfi_dump_stack_lvl+0x10/0x10 [ 186.633399][ T5071] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 186.633421][ T5071] dump_stack+0x19/0x20 [ 186.633442][ T5071] should_fail_ex+0x3d7/0x530 [ 186.633465][ T5071] should_fail_alloc_page+0xec/0x110 [ 186.633483][ T5071] __alloc_pages_noprof+0x1c0/0x7e0 [ 186.633503][ T5071] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 186.633526][ T5071] __folio_alloc_noprof+0x14/0x80 [ 186.633546][ T5071] folio_prealloc+0x46/0x220 [ 186.633565][ T5071] do_pte_missing+0x1e80/0x44f0 [ 186.633583][ T5071] ? _raw_spin_unlock+0x45/0x60 [ 186.633608][ T5071] ? pte_marker_clear+0x1b0/0x1b0 [ 186.633626][ T5071] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 186.633653][ T5071] ? __pte_offset_map+0x1b0/0x230 [ 186.633675][ T5071] ? pte_offset_map_rw_nolock+0xba/0x110 [ 186.633698][ T5071] handle_mm_fault+0x11b8/0x1bf0 [ 186.633723][ T5071] ? __kasan_check_write+0x18/0x20 [ 186.633747][ T5071] ? __cfi_handle_mm_fault+0x10/0x10 [ 186.633772][ T5071] ? follow_page_pte+0x4b9/0xbc0 [ 186.633792][ T5071] ? gup_must_unshare+0x1e0/0x1e0 [ 186.633812][ T5071] ? vma_is_secretmem+0x11/0x50 [ 186.633832][ T5071] __get_user_pages+0x1170/0x22b0 [ 186.633853][ T5071] ? populate_vma_page_range+0x220/0x220 [ 186.633871][ T5071] ? down_read+0x7f/0xe0 [ 186.633888][ T5071] ? __cfi_down_read+0x10/0x10 [ 186.633907][ T5071] __mm_populate+0x2f8/0x430 [ 186.633926][ T5071] do_mlock+0x7eb/0xa00 [ 186.633946][ T5071] ? fput+0x1a4/0x240 [ 186.633963][ T5071] ? lru_gen_add_folio+0x860/0x860 [ 186.633983][ T5071] ? ksys_write+0x1f3/0x260 [ 186.634005][ T5071] ? __cfi_ksys_write+0x10/0x10 [ 186.634029][ T5071] ? __kasan_check_read+0x15/0x20 [ 186.634051][ T5071] __x64_sys_mlock+0x64/0x80 [ 186.634070][ T5071] x64_sys_call+0x670/0x2ee0 [ 186.634093][ T5071] do_syscall_64+0x57/0xf0 [ 186.634137][ T5071] ? clear_bhb_loop+0x50/0xa0 [ 186.634160][ T5071] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 186.634181][ T5071] RIP: 0033:0x7fee14f9c799 [ 186.634203][ T5071] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 186.634217][ T5071] RSP: 002b:00007fee15f1f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 186.634242][ T5071] RAX: ffffffffffffffda RBX: 00007fee15215fa0 RCX: 00007fee14f9c799 [ 186.634256][ T5071] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 186.634268][ T5071] RBP: 00007fee15f1f090 R08: 0000000000000000 R09: 0000000000000000 [ 186.634279][ T5071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 186.634291][ T5071] R13: 00007fee15216038 R14: 00007fee15215fa0 R15: 00007ffcfe175b08 [ 186.634308][ T5071] [ 191.285034][ T36] kauditd_printk_skb: 60939 callbacks suppressed [ 191.285052][ T36] audit: type=1400 audit(2000000086.117:452515): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.291192][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 191.291576][ T36] audit: type=1400 audit(2000000086.117:452516): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.313143][ T149] audit: audit_lost=53458 audit_rate_limit=0 audit_backlog_limit=64 [ 191.319494][ T36] audit: type=1400 audit(2000000086.117:452517): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.340947][ T149] audit: backlog limit exceeded [ 191.348744][ T36] audit: type=1400 audit(2000000086.117:452518): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.370471][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 191.375925][ T36] audit: type=1400 audit(2000000086.117:452519): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 191.396395][ T149] audit: audit_lost=53459 audit_rate_limit=0 audit_backlog_limit=64 [ 192.865207][ T5098] netlink: 'syz.1.1876': attribute type 4 has an invalid length. [ 192.878353][ T5101] netlink: 'syz.3.1877': attribute type 16 has an invalid length. [ 192.887810][ T5101] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2583 sclass=netlink_route_socket pid=5101 comm=syz.3.1877 [ 194.712224][ T5111] FAULT_INJECTION: forcing a failure. [ 194.712224][ T5111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 194.725761][ T5111] CPU: 0 UID: 0 PID: 5111 Comm: syz.0.1878 Not tainted syzkaller #0 6e9554c60025b20768244e67b1d15d7ce813f552 [ 194.725789][ T5111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 194.725801][ T5111] Call Trace: [ 194.725808][ T5111] [ 194.725815][ T5111] __dump_stack+0x21/0x30 [ 194.725843][ T5111] dump_stack_lvl+0x140/0x1c0 [ 194.725865][ T5111] ? __cfi_dump_stack_lvl+0x10/0x10 [ 194.725887][ T5111] ? __alloc_pages_noprof+0x7e0/0x7e0 [ 194.725909][ T5111] dump_stack+0x19/0x20 [ 194.725929][ T5111] should_fail_ex+0x3d7/0x530 [ 194.725951][ T5111] should_fail_alloc_page+0xec/0x110 [ 194.725968][ T5111] __alloc_pages_noprof+0x1c0/0x7e0 [ 194.725988][ T5111] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 194.726013][ T5111] __folio_alloc_noprof+0x14/0x80 [ 194.726032][ T5111] folio_prealloc+0x46/0x220 [ 194.726050][ T5111] do_pte_missing+0x1e80/0x44f0 [ 194.726067][ T5111] ? _raw_spin_unlock+0x45/0x60 [ 194.726092][ T5111] ? pte_marker_clear+0x1b0/0x1b0 [ 194.726110][ T5111] ? __cfi_cgroup_rstat_updated+0x10/0x10 [ 194.726137][ T5111] ? __pte_offset_map+0x1b0/0x230 [ 194.726158][ T5111] ? pte_offset_map_rw_nolock+0xba/0x110 [ 194.726180][ T5111] handle_mm_fault+0x11b8/0x1bf0 [ 194.726204][ T5111] ? __kasan_check_write+0x18/0x20 [ 194.726230][ T5111] ? __cfi_handle_mm_fault+0x10/0x10 [ 194.726255][ T5111] ? follow_page_pte+0x4b9/0xbc0 [ 194.726275][ T5111] ? gup_must_unshare+0x1e0/0x1e0 [ 194.726294][ T5111] ? vma_is_secretmem+0x11/0x50 [ 194.726315][ T5111] __get_user_pages+0x1170/0x22b0 [ 194.726337][ T5111] ? populate_vma_page_range+0x220/0x220 [ 194.726356][ T5111] ? down_read+0x7f/0xe0 [ 194.726382][ T5111] ? __cfi_down_read+0x10/0x10 [ 194.726400][ T5111] __mm_populate+0x2f8/0x430 [ 194.726419][ T5111] do_mlock+0x7eb/0xa00 [ 194.726438][ T5111] ? fput+0x1a4/0x240 [ 194.726457][ T5111] ? lru_gen_add_folio+0x860/0x860 [ 194.726478][ T5111] ? ksys_write+0x1f3/0x260 [ 194.726500][ T5111] ? __cfi_ksys_write+0x10/0x10 [ 194.726522][ T5111] ? __kasan_check_read+0x15/0x20 [ 194.726544][ T5111] __x64_sys_mlock+0x64/0x80 [ 194.726564][ T5111] x64_sys_call+0x670/0x2ee0 [ 194.726588][ T5111] do_syscall_64+0x57/0xf0 [ 194.726607][ T5111] ? clear_bhb_loop+0x50/0xa0 [ 194.726629][ T5111] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 194.726650][ T5111] RIP: 0033:0x7fee14f9c799 [ 194.726667][ T5111] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 194.726682][ T5111] RSP: 002b:00007fee15f1f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 194.726704][ T5111] RAX: ffffffffffffffda RBX: 00007fee15215fa0 RCX: 00007fee14f9c799 [ 194.726729][ T5111] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 194.726742][ T5111] RBP: 00007fee15f1f090 R08: 0000000000000000 R09: 0000000000000000 [ 194.726755][ T5111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 194.726767][ T5111] R13: 00007fee15216038 R14: 00007fee15215fa0 R15: 00007ffcfe175b08 [ 194.726783][ T5111] [ 196.624337][ T36] kauditd_printk_skb: 60828 callbacks suppressed [ 196.624355][ T36] audit: type=1400 audit(2000000091.118:513032): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.630261][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 196.631573][ T36] audit: type=1400 audit(2000000091.128:513033): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.660988][ T149] audit: audit_lost=53565 audit_rate_limit=0 audit_backlog_limit=64 [ 196.680421][ T36] audit: type=1400 audit(2000000091.128:513034): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.687795][ T149] audit: backlog limit exceeded [ 196.709001][ T36] audit: type=1400 audit(2000000091.128:513035): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.714074][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 196.735024][ T36] audit: type=1400 audit(2000000091.128:513036): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 196.741508][ T149] audit: audit_lost=53566 audit_rate_limit=0 audit_backlog_limit=64 [ 200.965144][ T969] usb 4-1: USB disconnect, device number 9 [ 200.971609][ T969] ftdi_sio 4-1:0.0: device disconnected [ 201.186410][ T12] bridge_slave_1: left allmulticast mode [ 201.192134][ T12] bridge_slave_1: left promiscuous mode [ 201.207644][ T12] +$<¶: port 2(bridge_slave_1) entered disabled state [ 201.239800][ T12] +$<¶: port 1(bridge_slave_0) entered disabled state [ 201.403695][ T12] veth1_macvtap: left promiscuous mode [ 201.409236][ T12] veth0_vlan: left promiscuous mode [ 201.689098][ T12] bridge_slave_1: left allmulticast mode [ 201.694815][ T12] bridge_slave_1: left promiscuous mode [ 201.700771][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.708666][ T12] bridge_slave_0: left allmulticast mode [ 201.714528][ T12] bridge_slave_0: left promiscuous mode [ 201.720297][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.728063][ T12] bridge_slave_1: left allmulticast mode [ 201.734052][ T12] bridge_slave_1: left promiscuous mode [ 201.739679][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.747612][ T12] bridge_slave_0: left allmulticast mode [ 201.753389][ T12] bridge_slave_0: left promiscuous mode [ 201.759003][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.947787][ T12] veth1_macvtap: left promiscuous mode [ 201.953405][ T12] veth0_vlan: left promiscuous mode [ 201.963641][ T36] kauditd_printk_skb: 59241 callbacks suppressed [ 201.963657][ T36] audit: type=1400 audit(2000000096.129:570369): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 201.979621][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 201.991544][ T36] audit: type=1400 audit(2000000096.138:570370): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 201.999561][ T149] audit: audit_lost=54203 audit_rate_limit=0 audit_backlog_limit=64 [ 202.019333][ T36] audit: type=1400 audit(2000000096.138:570371): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.038233][ T149] audit: backlog limit exceeded [ 202.048494][ T36] audit: type=1400 audit(2000000096.138:570372): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.059859][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.074523][ T36] audit: type=1400 audit(2000000096.138:570373): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.102044][ T36] audit: type=1400 audit(2000000096.138:570374): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.302994][ T36] kauditd_printk_skb: 62994 callbacks suppressed [ 207.303011][ T36] audit: type=1400 audit(2000000101.149:632776): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.310799][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 207.330697][ T36] audit: type=1400 audit(2000000101.149:632777): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.337089][ T149] audit: audit_lost=54402 audit_rate_limit=0 audit_backlog_limit=64 [ 207.358393][ T36] audit: type=1400 audit(2000000101.149:632778): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.366213][ T149] audit: backlog limit exceeded [ 207.387378][ T36] audit: type=1400 audit(2000000101.149:632779): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.392543][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 207.413386][ T36] audit: type=1400 audit(2000000101.149:632780): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 207.419907][ T149] audit: audit_lost=54403 audit_rate_limit=0 audit_backlog_limit=64